Ch. 1. Opportunities...and Risks -- Ch. 2. Understanding the Threats to Security -- Ch. 3. Building the Internet Security Program -- Ch. 4. Designing and Implementing the Security Program -- Ch. 5. Securing the Internet Connection -- Ch. 6. The Firewall -- Ch. 7. Securing User Services -- Ch. 8. Securing Business Services -- Ch. 9. Responding to Internet Attacks -- Ch. 10. Electronic Commerce -- Ch. 11. The Future of the Internet and Internet Security -- Appendix A: Legal and Social Issues in the Workplace -- Appendix B: TCP/IP Protocol Vulnerabilities -- Appendix C: Internet Security Policy -- Appendix D: Alliances -- Appendix E: Where to Find More Information