(This book starts with the introduction of security issues, and discusses the important parts of tcp/ip protocol cluster; Then, the structure of firewall is described in detail, several common firewall gateways are analyzed, and the selection of various authentication strategies and the use of various gateway tools are described in detail; On this basis, through the classification and analysis of hacker behavior and various attacks, this paper discusses how to deal with hacker intrusion in specific practice and how to maintain the security of the system; Finally, the legal issues involved in computer security and how to apply cryptographic knowledge to protect information in high-risk environments are discussed. The author of this book is a senior expert in computer security of ATT company. This book condenses their years of research and practical experience. It is an essential reference book for system and network design and management personnel.)