Preface Intoday’sworld,wherecomputervirusesandsecuritythreatsarecommonthemesin anythingfromHollywoodmoviesandTVadvertisementstopoliticaldiscussions,itseems unthinkabletoignoresecurityconsiderationsinthedesignandimplementationofany network.However,itisonlyinth