$B$3$N$?$S(B Webmasters$B$G$O(B, $B3t<02q
$BBh(B60$B2s%V%C%/%l%S%e!<$NJg=8$O=*N;$$$?$7$^$7$?(B.
$B$"$j$,$H$&$4$6$$$^$7$?(B.
$B$3$N=q@R$O(B $BCx
$B%l%S%e!<%"$H$J$C$?J}$K$O(B, $B=(OB%7%9%F%`(B $BMM(B $B$+$i$3$N=q@R$,Aw$i$l$^$9(B.
$BFI$_=*$o$j$^$7$?$H$3$m$G(B 1000$B!A(B2000 $B;zDxEY$N%l%S%e!<5-;v$r$^$H$a(B,
$B%a!<%k$GAwIU$7$F$$$?$@$-$^$9(B.
$B5-;v$N!:@Z$O(B 2002 $BG/(B 3 $B7n=i$a(B $B$H$9$kM=Dj$G$9(B.
$B!X?^2rF~Lg(B $B$h$/$o$+$k:G?7%M%C%H%o!<%/%;%-%e%j%F%#$N4pK\$H;EAH$_!Y$O(B 4 $B:}$r(B
$B8%K\$7$F$$$?$@$1$k$3$H$K$J$C$F$*$j$^$9(B.
$B%l%S%e!<%"$O(B, Webmasters $B%a%s%P!<$K$FA*9M$J$i$S$KCjA*$N>e(B,
$B7hDj$5$;$F$$$?$@$-$^$9(B.
$B%l%S%e!<%"$H$J$C$?J}$K$O(B,
Webmasters $B$h$j3NG'$N%a!<%k$r$b$C$F$40FFb$5$;$F$$$?$@$-$^$9(B.
$B=(OB%7%9%F%`(B $BMM$+$i=q@R$r$*Aw$j$7$F$$$?$@$/4X78>e(B,
$B%l%S%e!<%"$K$J$i$l$?J}$K$O(B,
$BI,$:(B$B5-;v$r$$$?$@$1$^$9$h$&$*4j$$$$$?$7$^$9(B.
$B%V%C%/%l%S%e!<%3!<%J!<$G$O(B, $B4pK\E*$K
$B>e5-$K$4M}2r$r$$$?$@$$$?>e$G%l%S%e!<$r4uK>$5$l$kJ}$O(B,
$B%a!<%k$G?=$79~$_$r$*4j$$$7$^$9(B.
$B0J2<$K%l%S%e!
$B$4Cm0U(B:
$B1~JgJ}K!(B
Subject: book review yokuwakaru saishin network security no kihon to shikumi
$B$r?=$79~$_%a!<%k$N@hF,$K5-F~$7$F$/$@$5$$(B.$B%l%S%e!
$B"#=q@R$N35MW!'(B
$B=qL>(B $B?^2rF~Lg(B $B$h$/$o$+$k:G?7%M%C%H%o!<%/%;%-%e%j%F%#$N4pK\$H;EAH$_(B
$BI{Bj(B $B%S%8%M%9$H>pJs$rl$G!"%;%-%e%j%F%#$K4X$9$kCN<1$N=,F@!"%;%-%e%j%F%#(B
$B0U<1$N2~A1$KLrN)$D0l:}$G$9!#(B
$B"!BP>]$H$J$kFI
$B$4MxMQ$N:]$O(B$BLH@U!&Cx:n8">pJs(B$B$r$4Mw$/$@$5$$(B.
$Id: reviewer60.html,v 1.10 2008/01/02 17:22:47 takei Exp $