Chapter 8. Securing network services