You are on page 1of 1

NEW BOOMS AND MULTIMEDIA

overflow, weaknesses of the languages ing (the mechanisms, not the routing to implement elaborate algorithms at
used in developing Web applications, protocols) and an excellent three-chap- routers and gateways. As such, reading
and so on. Augmentcd,hy a cornucopia ter exposition of DNS. The second part, the book could calibrate one’s expecta-
of automated tools aiding the attackers, “End-User and System Applications,” tions (and bring them down to earth, for
it is clear that a person on the defense follows, as expected, the popular appli- what it’s worth). Content-wise the book
needs min-depth technical discussion of cations, SMTP, POP3, IMAP, HTTP, is a successful synthesis of academic top-
the design and architectural issues, and DHCP, and telnet. However, the appli- ics (mostly in the first seven chapters,
this is what the authors of the book cations a r e used as a good excuse t o the “Design Principles” part of the hook)
attempt to do. The content is a mix of introduce more troubleshooting tools and practical implementation issues (the
eye-opening presentation to convince (ethereal, ngrep), present the TCP statc second part, eight chapters total), the
even seasoned site managers that a close machine as well as UDP, and talk about latter mostly by industrial contributors.
look and audit into their applications presentation formats and MIME. The The design part covers a good deal of
and systems is worth the (re)try. Clearly third part crosses thc river to find Win- benchmarking, modeling, and simulation
the hook provides plenty of information dows in its own idiosyncratic world of methodologies; plus design space explo-
on what not to do, providing examples NetBIOS, and its subsequent name reso- ration (really, scheduling) and compiler
of what to avoid, while not necessarily lution quirks: NT domains, the browse back-end optimization. The “practical”
dealing with how to build secure systems server, and all the rest of Windows-spe- part is introduced by a short review of
in the first place. In fact, one has t o cific components and terminology. industry’s take on NPs, contributed by
wonder if by using certain off;the-shelf Samba is covered well hut not hcavily, as John Freeman (“Analyst’s Perspective of
products the compromises don’t start at there are other hooks dcvoted specifical- NPs”) and is followed by the presenta-
the very first step. Until a hook is writ- ly to Samba. The last part, “Connecting tion of an array of NP designs, recogniz-
ten on how to write secure Web applica- to the Internet and Internet Security,” able by their brand names: PayloadPlus
tions in a multilanguage, multi-OS, extends beyond basics of installing dialup (Agere), Toaster 2 (Cisco), PowerNP
multiplatform environment, it is good (and other) Internet connectivity (IBM), IXP2400 (Intel), C5e (Motoro-
for an application developer to keep this options, to a detailed description of what la), ClassiPI (PMC-Sierra), ASPEN
book handy. precautions are necessary for living with (Transswitch).
Internet connectivity: firewalls, NAT
Practical TCP/IP, Designing, boxes, VPNs, and so on. A rich set of
appendices (26) provides reference Wireless Securiv and Priva-
Using and Troubleshooting material: RFCs, response codes for dif- cy, Best Practices and Design
TCP/IP Networks on h u x ferent protocols, toolkit suggestions, key
Techniques
tool man pages, and experience-related
and Windows system management topics (organizing Tara M. Swaminatha and Charles R.
Niall Mansfield, 2003, Addison-Wes- downloads, etc.). Elden, 2003, Addison-Wesley, ISBN
ley, ISBN 0-201-75078-3,851 pages, 0-201-76034-7, 276 pages, softcover
softcover Network Processor Design, ‘The fairly recent WEP security deha-
Linux servers and Windows clients cle and subsequent fixes illustrated that
machines are an increasingly familiar Issues and Practices: Volume I not only is it necessary to include secu-
sight in corporate environments; despite Patrick Crowley, Mark A. Franklin, rity aspects into protocols and stan-
both being able to speak TCPIIP, each Haldun Hadimioglu, and Peter Z. dards, but also t o carefully study the
OS comes with its own set of “natural” Onufryk, 2003, Morgan Kaufmann, limitations of proposed schemes before
tools to perform networking tasks. Niall ISBN 155860-875-3, 338 pages, standards are released and markets
Mansfield’s book is for anyone wishing softcover shaped accordingly. It is worse to pos-
to configure and operate a TCPiIP net- The gap between the speed of com- sess a false sense of security than to be
work in a mixed UNIXlWindows envi- munication links, in the range of multi- aware of the lack of, security. Convinc-
ronment. The defining element of this ple gigabits per second, and processor ing the reader from the very first page
book is that it attempts to describe both speeds created ample opportunity to of the foreward by providing a list of 10
the how and why t o a widely ranging rethink the value of peripheral proces- major news stories on wireless security
audience in terms of a computer net- sors’dedicated to network protocol pro- that reached the mass media, the book
working background. However, its read- cessing and to come up with innovative subsequently takes a direction of pre-
abiliq is not compromised. All chapters architectures.in the guise of network senting wireless networks, their inher-
are modular, and special effort has been processors (NPs). Today’s applications, cnt vulnerabilities due the nature of the
put into collocating text and correspond- such as firewallsl encwtion, accounting, medium, and.the vulnerabilities exposed
ing figures. In fact, the book is heavily and load balancing, necessitate substan- by both lower-layer protocols and appli-
and (stylistically) consistently illustrated. tial per-packet andlor per-session pro- cations. As stated in the book‘s inten-
With the wide variety of tools and con- cessing. T h e result is NPs that differ tions, it is meant to educate the reader
figurations +cussed, hardly a page goes from “classical” embedded processors in and filter away the hype. I t is not a
by without an example. Its four-part that they have to be both flexible (pro- book that proposes specific technical
structure roughly corresponds t o the grammable) in anticipation of as yet answers, but rather a broader “aware-
four different themes undcr which it can unknown future applications, and at the ness” book, positioned to appeal to a
he used. Part 1, “How and Why Packets same time be capable of sustaining real- wide audience, including the general
Move on the Network,” is a nine-chapter time performance under worst-case traf- public, business professionals, and end
introduction that avoids the mundanc by fic loading. While the primary audience consumers. In the fundamentals, the
introducing tools (packet sniffers) and, are researchers and developers of NPs, first two chapters, its author introduces
to heighten the reader’s interest, illus- the book is valuable to any researcher what he calls t h e Identify Analyze
trating what the captured packets stand contemplating protocol extensions (e.g., Define Design (I-ADD) process. The
for. The first part adds a review of rout- fanciful per-packet processing) who seek more technically rich material begins in

6 IEEE Nehvork -1ulylAugust 2003

You might also like