home
our
services
about Peter Davis+Assoc.
contact
security/audit
info
Privacy Test
Security & Audit
Tools
CyberScribblings
- Security &
Audit Products
-
- Top Ten
Security Links
-
- Security &
Audit Checklists
-
- Computer &
Security
- Glossary
-
- Security
& Audit Bibliography
-
- Search Page
legal info
privacy
info
|
[ Business
]
[ Cryptography ] [
Firewalls ]
[ General Security ] [
Hacking ]
[ Internet/Intranet Security ] [
Intrusion Detection ] [ Legal ] [
NetWare Security] [ Network Security ] [
Privacy ]
[ Routers and Switches ] [
UNIX/Linux Security ] [ Web Server Security ] [
Windows NT/2000/XP and .NET Security ]
Business
- Bergeron, Bryan.
2002. Dark Ages II: When the Digital Data Die.
Prentice Hall: Upper Saddle River, NJ.
-
- Berners-Lee, Tim with
Mark Fischetti. 1999. Weaving the Web.
HarperCollins: New York.
-
- Coderre, David G.
1998. CAATTs and other Beasts for Auditors.
Global Audit Publications: Vancouver, BC.
-
- Comer, Michael J.,
Patrick M. Ardis and David H. Price. 1988. Bad
Lies in Business. McGraw-Hill: London.
-
- Davis, Stan and Bill
Davidson. 1991. 2020 Vision. Simon &
Shuster: New York.
-
- Davis, Stanley M.
1987. Future Perfect. Addison-Wesley
Publishing Company, Inc.: Reading, MA.
-
- Gelernter, David.
1991. Mirror Worlds or: The Day Software Puts
the Universe in a Shoebox...How It Will Happen
and What It Will Mean. Oxford University
Press, Inc.: New York.
-
- Harris, Robert L.
1996. Information Graphics: A Comprehensive
Illustrated Reference. Management Graphics:
Atlanta, GA.
-
- Louis, P. J. 2001. M-Commerce
Crash Course. McGraw-Hill: New York.
-
- Martin, James. 1995. The
Great Transition. Amacom: New York.
-
- Negroponte, Nicholas.
1995. being digital. Vintage Books: New
York.
-
- Postman, Neil. 1992. Technopoly:
The Surrender of Culture to Technology.
Alfred A. Knopf: New York.
-
- Ries, Al. 1996. Focus:
The Future of Your Company Depends On It.
HarperBusiness: New York.
-
- Stephenson, Neal.
1999. In The Beginning ... Was The Command
Line. Avon Books: New York.
-
- Stoll, Clifford.
1999. High Tech Heretic. Doubleday: New
York.
-
- Stoll, Clifford.
1996. Silicon Snake Oil : Second Thoughts on
the Information Highway.
Anchor Books/Doubleday: New York.
[
Back to Top ]
Cryptography
- Bamford, James. 1983.
The Puzzle Palace. Penguin Books: New
York.
-
- Kippenhahn, Rudolf.
1999. Code Breaking: A History and
Exploration. Overlook Press, Woodstock, NY.
-
- Schneier, Bruce.
1994. Applied Cryptography. John Wiley
& Son: New York.
Singh, Simon. 1999. The
Code Book. Fourth Estate: London.
Smith, Richard E. 1997. Internet
Cryptography. Addison-Wesley: Reading, MA.
Wrixon, Fred B. 1998. Codes,
Ciphers & Other Cryptic & Clandestine
Communication. Black Dog & Leventhal Publishers:
New York.
[
Back to Top ]
Firewalls
- Alexander, Zubair. 2002.
Microsoft ISA Server 2000. Sams Publishing:
Indianapolis, IN.
-
- Amoroso, Edward and
Ronald Sharp. 1996. Intranet and Internet
Firewall Strategies. Ziff-Davis Press:
Emeryville, CA.
-
- Chapman, D. Brent and
Elizabeth D. Zwicky. 1995. Building Internet
Firewalls. O'Reilly & Associates, Inc.:
Sebastopol, CA.
-
- Cheswick, William R.
and Steven M. Bellovin. 1994. Firewalls and
Internet Security. Addison-Wesley: Reading,
MA.
-
- Fuller, Scott and
Kevin Pagan. 1997. Intranet Firewalls.
Ventana Communications Group: Research Triangle
Park, NC.
-
- Goncalves, Marcus.
1997. Firewalls Complete. McGraw-Hill: New
York.
-
- Goncalves, Marcus.
1997. Protecting Your Web Site with Firewalls.
Prentice Hall PTR: Upper Saddle River, NJ.
-
- Heldman, William. 2001.
MCSE: ISA Server 2000 Administration Study Guide. SYBEX:
Alameda, CA.
-
- Schuler, Kevin. 1998.
Microsoft Proxy Server 2 on site.
Coriolis: Scottsdale, AZ.
-
- Shinder, Dr. Thomas W., Debra
Littlejohn Shinder and Martin Grasdal. 2001.
Configuring ISA Server 2000: Building Firewalls for Windows 2000.
Syngress Publishing: Rockland, MA.
-
- Siyan, Karanjit S.
and Chris Hare. 1995. Internet Firewalls and
Network Security. New Riders Publishing:
Indianapolis, IN.
[
Back to Top ]
General Security
- Alexander, Michael.
1996. The Underground Guide to Computer
Security. Addison-Wesley: Reading, MA.
-
- ARCA, edited by.
1993. INFOSEC Handbook. ARCA: San Jose,
CA.
-
- Davies, Simon. 1997. Big
Brother. Pan Books: London.
-
- Davis, Peter T. and
Barry D. Lewis. 1996.
Computer Security for Dummies. IDG Books: Foster City, CA.
-
- DeMaio, Harry B.
1992. Information Protection and Other
Unnatural Acts. AMACOM: New York.
-
- Flynn, Nancy. 2001. The
E-Policy Handbook. AMACOM: New York.
-
- Icove, David; Karl
Seger & William VonStorch. 1995. Computer
Crime: A Crimefighter's Handbook. O'Reilly
& Associates, Inc.: Sebastopol, CA.
-
- Kane, Pamela. 1989. V.I.R.U.S.
Protection: Vital Information Resources Under
Siege. Bantam Books: New York.
-
- Keen, Peter, Criagg
Ballance, Sally Chan and Steve Schrump. 2000. Electronic
Commerce Relationships. PH PTR: Upper Saddle
River, NJ.
-
- King, Dennis. 1999. Get
the Facts on Anyone, 3rd Edition. Macmillan:
New York.
-
- Kovacich, Dr. Gerald
L. 1998. Information Systems Security
Officer's Guide. Butterworth-Heinemann:
Woburn, MA.
-
- Levy, Stephen. 1984. Hackers:
Heroes of the Computer Revolution. Dell
Publishing: New York.
-
- Lundell, Allan. 1989.
VIRUS!. Contemporary Books: Chicago.
-
- Middleton, Bruce.
2002. Cyber Crime Investigator's Field Guide.
CRC Press: Boca Raton, FL.
-
- National Research
Council. 1991. Computers at Risk: Safe
Computing in the Information Age. National
Academy Press: Washington.
-
- Pipkin, Donald L.
1997. Halting the Hacker: A Practical Guide to
Computer Security. Prentice Hall PTR: Upper
Saddle River, NJ.
-
- Pipkin, Donald L.
2000. Information Security.
Hewlett-Packard Professional Books: Upper Saddle
River, NJ.
-
- Schneier, Bruce.
1995. E-Mail Security: How to Keep Your
Electronic Messages Private. John Wiley &
Son: New York.
-
- Schneier, Bruce.
2000. Secrets and Lies. John Wiley &
Son: New York.
-
- Slade, Robert. 1996. Robert
Slade's Guide to Computer Virues. Second
Edition. Springer: New York.
-
- Solomon, Dr. Alan and
Tim Kay. 1994. Dr Solomon's PC Anti-virus Book.
New Tech: Oxford.
-
- Tiley, Ed. 1996. Personal
Computer Security. IDG Books: Foster City,
CA.
Hacking
BloomBecker, Buck. 1990. Spectacular
Computer Crimes. Dow Jones-Irwin: Homewood, IL.
- Bowcott, Owen and
Sally Hamilton. 1990. Beating the System:
Hackers, Phreakers and Electronic Spies.
Bloomsbury Publishing Ltd.: London.
-
- Chirillo, John. 2001.
Hack Attacks Denied. John Wiley &
Sons, Inc.: New York.
-
- Chirillo, John. 2001.
Hack Attacks Revealed. John Wiley &
Sons, Inc.: New York.
-
- Cornwall, Hugo. 1990.
Data Theft. Mandarin Paperbacks: London.
-
- Cornwall, Hugo. 1988.
Hacker's Handbook III. Random Century
Ltd.: London.
-
- Cornwall, Hugo. 1991.
The Industrial Espionage Book. Random
Century Ltd.: London.
-
- Denning, Dorothy E.
1999. Information Warfare and Security.
Addison-Wesley: Reading, MA.
-
- Dr. K. 2000. A
Complete H@cker's Handbook. Carlton
Books: London.
-
- Goodell, Jeff. 1996. The
Cyberthief and the Samurai. Dell: New York.
-
- Hafner, Katie and
John Markoff. 1991. Cyberpunk: Outlaws and
Hackers on the Computer Frontier. Simon &
Schuster: New York.
-
- Himanen, Pekka. 2001.
The Hacker Ethic and the Spirit of the
Information Age. Vintage: London.
-
- Landreth, Bill. 1989.
Out of the Inner Circle. Tempus Books:
Redmond, WA.
-
- Littman, Jonathan.
1996. The Fugitive Game. Little, Brown
& Company: Boston, MA.
-
- Littman, Jonathan.
1997. The Watchman. Little, Brown &
Company: Boston, MA.
-
- McAfee, John and
Colin Hayes. 1989. Computer Viruses, Worms,
Data Diddlers, Killer Programs, and Other Threats
to Your System. St. Martin's Press: New York.
-
- McClure, Stuart, Joel
Scambray and George Kurtz. 1999. Hacking
Exposed. Osborne/McGraw-Hill: Berkeley.
-
- Platt, Charles. 1996.
Anarchy Online. Harper Prism: New York.
-
- Russell, Ryan and
Stace Cunningham. 2000. Hack Proofing Your
Network: Internet Tradecraft.
Syngress:Rockland, MA.
-
- Schwartau, Winn.
2000. Cybershock: Surviving Hackers,
Phreakers, Identity Thieves, Internet Terrorists
and Weapons of Mass Disruption. Thunder's
Mouth Press: New York.
-
- Schwartau, Winn.
1994. Information Warfare. Thunder's Mouth
Press: New York.
-
- Schwartau, Winn.
1991. Terminal Compromise. Inter*Pact
Press: U.S.
-
- Shimomura, Tsutomu
and John Markoff. 1996. Takedown.
Hyperion: New York.
-
- Slatalla, Michelle
and Joshua Quittner. 1995. Masters of
Deception: The Gang that Ruled Cyberspace.
Harper Collins Publishers: New York.
-
- Sterling, Bruce.
1992. The Hacker Crackdown. Bantam Books:
New York.
-
- Stoll, Clifford.
1989. The Cuckoo's Egg. Doubleday: New
York.
-
- The Knightmare. 1994.
Secrets of a Super Hacker. Loompanics
Unlimited: Port Townsend, WA.
-
- Wang, Wallace. 2001. Steal
This Computer Book 2. No Starch Press: San
Francisco.
-
- Winkler, Ira. 1997. Corporate
Espionage. Prima Publishing: Rocklin, CA.
[
Back to Top ]
Internet/Intranet
Security
- Ahuja, Vijay. 1996. Network
and Internet Security. Academic Press, Inc.:
Boston.
-
- Ahuja, Vijay. 1997. Secure
Commerce on the Internet. Academic Press
Professional: Boston.
-
- Atkins, Derek; Paul
Buis et al. 1996. Internet Security:
Professional Reference. New Riders:
Indianapolis, IN.
-
- Bahadur, Gary, William Chan and
Chris Weber. 2002. Privacy Defended: Protecting Yourself Online.
Que: Indianapolis, IN.
-
- Barrett, Daniel J.
1996. Bandits on the Information Superhighway.
O'Reilly & Associates, Inc.: Sebastopol, CA.
-
- Bernstein, Terry;
Anish B. Bhimani; Eugene Schultz and Carol A.
Siegel. 1996. Internet Security for Business.
John Wiley & Sons, Inc.: New York.
-
- Cohen, Frederick B.
1995. Protection and Security on the
Information Superhighway. John Wiley &
Sons, Inc.: New York.
-
- Cole, Eric. 2001. Hackers
Beware. New Riders: Indianapolis, IN.
-
- Cooper, Frederic J.,
et al. 1995. Implementing Internet Security.
New Riders Publishing: Indianapolis.
-
- Crothers, Tim. 2001.
Internet Lockdown: Internet Security Administrator's Handbook.
Hungry Minds: New York, NY.
-
- Crume, Jeff. 2000. Inside
Internet Security. Addison-Wesley: Harlow,
GB.
-
- Dahl, Andrew and
Leslie Lesnick. 1996. Internet Commerce.
New Riders: Indianapolis, IN.
-
- Danesh, Arman, Ali
Mehrassa and Felix Lau. 2002. Safe and Secure.
Sams Publishing: Indianapolis, IN.
-
- Davis, Peter T. 1994. Manager's Guide
to Internet Security. CSI: San Francisco.
-
- Edwards, Mark Joseph.
1998. Internet Security with Windows NT.
Duke Press: Loveland, CO.
-
- Freiss, Martin. 1997.
Protecting Networks with SATAN. O'Reilly
& Associates, Inc.: Sebastopol, CA.
-
- Hahn, Harley. 2002. Harley
Hahn's Internet InSecurity. Prentice Hall:
Upper Saddle River, NJ.
-
- Hare, Chris, and
Karanjit Siyan. 1996. Internet Firewalls and
Network Security. New Riders Publishing:
Indianapolis, IN.
-
- Howard, Garry S.
1995. Introduction to Internet Security: From
Basics to Beyond. Prima Online: Rocklin, CA.
-
- Hughes Jr., Larry J.
1995. Actually Useful Internet Security
Techniques. New Riders: Indianapolis, IN.
-
- Kyas, Othmar. 1997. Internet
Security. International Thomson Computer
Press: London.
-
- Lynch, Daniel C. and
Leslie Lundquist. 1996. Digital Money: The New
Era of Internet Commerce. John Wiley &
Son: New York.
-
- Mansfield, Richard. 2000.
Hacker Attack!. Sybex: San Francisco, CA.
-
- McCarthy, Linda.
1998. Intranet Security: Stories from the
Trenches. Sun Microsystems Press: Mountain
View, CA.
-
- McMahon, David. 2000.
Cyber Threat: Internet Security for Home and
Business. Warwick Publishing Inc.: Toronto.
-
- Pabrai, Uday O. and
Vijay K. Gurbani. 1996. Internet & TCP/IP
Network Security. McGraw-Hill: New York.
-
- Randall, Neil. 1995. Teach
Yourself the Internet in a Week. Sams.Net:
Indianapolis, IN.
-
- Schwartau, Winn and
Chris Goggans. 1996. The Complete Internet
Business Toolkit. Van Nostrand Reinhold: New
York.
-
- Schweitzer, Douglas. 2002.
Internet Security Made Easy. AMACOM: New York.
-
- Stallings, William.
1995. Internet Security Handbook. IDG
Books: Foster City, CA.
-
- Stallings, William;
Peter Stephenson et al. 1995. Implementing
Internet Security. New Riders Publishing:
Indianapolis, IN.
-
- Vacca, John. 1996. Internet
Security Secrets. IDG Books: Foster City, CA.
-
- Vacca, John. 1997. Intranet
Security. Charles River Media, Inc.:
Rockland, MA.
-
- Various. 2001. Security
Complete. SYBEX: Alameda, CA.
-
- Weiss, Aaron. 1995. The
Complete Idiot's Guide to Protecting Yourself on
the Internet. Que: Indianapolis, IN.
[
Back to Top ]
Intrusion Detection
- Amoroso, Edward.
1999. Intrusion Detection: An Introduction to
Internet Surveillance, Correlation, Trace Back,
Traps, and Repsonse. Intrusion.Net Books: Sparta,
NJ.
-
- Bace, Rebecca Gurley.
2000. Intrusion Detection. Macmillan
Technical Publishing: Indianapolis, IN.
-
- Escamilla, Terry.
1998. Intrusion Detection. John Wiley
& Sons: New York.
Murray, James D. 1998. Windows
NT Event Logging. O'Reilly:Sebastopol, CA.
Northcutt, Stephen. 1999. Network
Intrusion Detection: An Analyst's Handbook. New
Riders: Indianapolis, IN.
Northcutt, Stephen, Mark
Cooper, Matt Fearnow and Karen Frederick. 2001. Intrusion
Signatures and Analysis. New Riders: Indianapolis,
IN.
Proctor, Paul E. 2001. The
Practical Intrusion Detection Handbook. PH PTR:Upper
Saddle River, NJ.
[
Back to Top ]
Legal
- Johnston, David;
Sunny Handa and Charles Morgan. 1997. Cyberlaw.
Stoddart Publishing: Toronto.
-
- Overly, Michael R.
1999. e-policy: How to Develop Computer,
E-mail, and Internet Guidelines to Protect Your
Company and Its Assets. AMACOM: New York.
-
- Rose, Lance. 1995. NetLaw:
Your Rights in the Online World. McGraw-Hill:
New York.
-
- Schelling, Jeffrey M.
1998. Cyberlaw Canada. Self-Counsel Press:
North Vancouver, BC.
[
Back to Top ]
NetWare Security
- Sawicki, Ed. 1992. LAN
Desktop Guide to Security NetWare Edition.
Sams Publishing: Carmel, IN.
-
- Steen, William and
Doug Bierer. 1996. NetWare Security. New
Riders: Indianapolis, IN.
[
Back to Top ]
Network Security
- Alexander, Michael.
1997. Net Security: Your Digital Doberman.
Ventana Communications Group: Research Triangle
Park, NC.
-
- Anonymous. 1997. Maximum
Security: A Hacker's Guide to Protecting Your
Internet Site and Network. Sams Publishing:
Indianapolis, IN.
-
- Ballew, Scott M.
1997. Managing IP Networks with Cisco Routers.
O'Reilly & Associates, Inc.: Sebastopol, CA.
-
- Brenton, Chris with
Cameron Hunt. 2001. Active Defense: A
Comprehensive Guide to Network Security.
Sybex: San Francisco.
-
- Davis, Peter T. Editor. 1996.
Securing Client/Server Computer Networks. McGraw-Hill: New
York.
-
- Hu, Wei. 1995. DCE
Security Programming. O'Reilly &
Associates, Inc.: Sebastopol, CA.
-
- Hunt, Craig. 1992. TCP/IP
Network Administration. O'Reilly &
Associates, Inc.:Sebastopol, CA.
-
- Klander, Lars. 1997. Hacker
Proof: The Ultimate Guide to Network Security.
Jamsa Press: Las Vegas, NV.
-
- Kosiur, Dave. 1998. Building
and Managing Virtual Private Networks. John
Wiley & Sons: New York.
-
- Murhammer, Martin W.,
Tim A. Bourne, Tamas Gaidosch, Charles Kunzinger,
Laura Rademacher and Andreas Weinfurter. 1998. A
Guide to Virtual Private Networks. PH PTR:
Upper Saddle River, NJ.
-
- Simonds, Fred. 1996. Network
Security: Data and Voice Communications.
McGraw-Hill: New York.
-
- Stallings, William.
1995. Network and Internetwork Security.
Prentice Hall: Englewood Cliffs, CA.
-
- Stang, David J. and
Sylvia Moon. 1993. Network Security Secrets.
IDG Books: San Mateo, CA.
[
Back to Top ]
Privacy
- A Michael Wolff Book.
1996. How You Can Access the Facts and Cover
Your Tracks. Wolff New Media: New York.
-
- Bacard, Andre. 1995. The
Computer Privacy Handbook. Peachpit Press:
Berkeley, CA.
-
- Banks, Michael A.
2000. PC Confidential. Sybex: Alameda, CA.
-
- Banks, Michael A.
1997. Web Psychos and Stalkers and Pranksters.
Coriolis Group Books: Albany, NY.
-
- Cavoukian, Ann and
Don Tapscott. 1995. Who Knows: Safeguarding
your privacy in a networked world. Random
House of Canada: Toronto.
-
- Goncalves, Marcus et
al. 1997. Internet Privacy Kit. Que:
Indianapolis, IN.
-
- Pfaffenberger, Bryan.
1997. Protect Your Privacy on the Internet.
John Wiley & Sons: New York.
[
Back to Top ]
Routers and Switches
Ballew, Scott M. 1997. Managing
IP Networks with Cisco Routers. O'Reilly:
Sebastopol, CA.
Chappell, Laura A. 2000. Basic
TCP/IP LAN Configurations. podbooks.com: San Jose,
CA.
Ciccarelli, Patrick and
Christina Faulkner. 1999. CCNA Jumpstart. Sybex:
San Francisco.
Cisco Documentation. 1999.
Cisco IOS 12.0 Network Security. Cisco
Press:Indianapolis, IN.
Davis, Peter T. 2002.
Securing and Controlling Cisco Routers. Auerbach/CRC Press: Boca
Raton, FL.
Hamilton, Andrew, John
Mistichelli with Bryant G. Tow. 2000. Cisco Routers
24seven. Sybex: San Francisco.
Held, Gil and Kent
Hundley. 2000. Cisco Access Lists Field Guide.
McGraw-Hill: New York.
Held, Gil and Kent
Hundley. 1999. Cisco Security Architectures.
McGraw-Hill: New York.
Lammle, Todd and William
Tedder. 2000. CCNA Virtual Lab e-trainer. Sybex:
San Francisco.
Lewis, Chris. 1997. Cisco
TCP/IP Routing Professional Reference. McGraw-Hill:
New York.
Lusignan, Russell, Olivier
Steudler and Jacques Allison. 2000. Managing Cisco
Network Security. Syngress: Rockland, MA.
Mason, Andrew G. and Mark
J. Newcomb. 2001. Cisco Secure Internet Security
Solutions. Cisco Press: Indianapolis, IN.
Odom, Wendell. 1999. CCNA
Exam Certification Guide. Cisco Press: Indianapolis,
IN.
Rees, Matthew J. and
Jeffrey T. Coe. 1999. Routing and Switching.
Coriolis: Scottsdale, AZ.
Sedayo, Jeff. 2001. Cisco
IOS Access Lists. O'Reilly: Sebastopol, CA.
Seifert, Rich. 2000. The
Switch Book. Joh Wiley & Sons, Inc.: New York.
Shaughnessy, Tom. 2000. Cisco:
A Beginner's Guide. Osborne/McGraw-Hill: Berkeley,
CA.
Syngress Media, Inc. 1999.
Cisco CCNA Test Yourself Practice Exams.
Osborne/McGraw-Hill: Berkeley, CA.
[
Back to Top ]
UNIX/Linux Security
- Anderson, Bart, et
al. 1995. The Waite Group's UNIX
Communications and the Internet. Sams Pub.:
Indianapolis, IN.
-
- Barkakati, Naba.
2001. Linux Weekend Crash Course. Hungry
Minds, Inc.: New York.
-
- Braun, Christoph.
1995. UNIX System Security Essentials.
Addison-Wesley: Reading, MA.
-
- Curry, D. 1992. UNIX
System Security - A Guide for Users and System
Administrators. Addison-Wesley: Reading, MA.
-
- DeRoest, James. 1995.
AIX RS/6000 System and Administration Guide.
McGraw-Hill: New York, NY.
-
- Farrow, Rik. 1991. UNIX
Systems Security. Addison-Wesley: Reading,
MA.
-
- Ferbrache, David and
Gavin Shearer. 1993. UNIX Installation
Security and Integrity. Prentice Hall PTR:
Indianapolis, IN.
-
- Garfinkel, Simson and
Gene Spafford. 1996. Practical UNIX &
Internet Security. O'Reilly & Associates,
Inc.:Sebastopol, CA.
-
- Gregory, Peter H.
2000. Solaris Security. Sun Microsystems Press/Prentice Hall:
Upper Saddle River, NJ.
-
- Grottola, Michael G.
1993. The UNIX Audit: Using UNIX to Audit UNIX.
McGraw-Hill: New York.
-
- Miles, Wyman; Ed
Mitchell; F. William Lynch and Randy Cook. 2001. Hack
Proofing Linux. Syngress Publishing:
Rockland, MA.
-
- Stanger, James;
Patrick T. Lane and Edgar Danielyan. 2001. Hack
Proofing Sun Solaris 8. Syngress Publishing:
Rockland, MA.
-
- Wood, Patrick H. and
Stephen G. Kochan. 1988. UNIX System Security.
Hayden Books: Indianapolis, IN.
[
Back to Top ]
Web Server Security
Garfinkel, Simson and Gene
Spafford. 1997. Web Security & Commerce.
O'Reilly & Associates, Inc.: Sebastopol, CA.
Liu, Cricket; Jerry Peek,
Russ Jones, Bryan Buus, and Adrian Nye. 1994. Managing
Internet Information Services. O'Reilly &
Associates, Inc.: Sebastopol, CA.
- MacGregor, Robert S.,
Alberto Aresi and Andreas Siegert. 1996. www.security.
Prentice Hall PTR: Upper Saddle River, NJ.
-
- McGraw, Gary and
Edward W. Felten. 1997. Java Security.
Wiley Computer Publishing: New York.
Rescoria, Eric. 2001. SSL
and TLS: Designing and Building Secure Systems.
Addison-Wesley: Boston.
Rubin, Aviel D.; Daniel
Geer and Marcus J. Ranum. 1997. Web Security
Sourcebook. John Wiley & Son: New York.
Stein, Lincoln D. 1998. Web
Security: A Step-by-Step Reference Guide.
Addison-Wesley: Reading, MA.
[
Back to Top ]
Windows NT/2000/XP and .NET Security
- Citibank N.A.,
Coopers & Lybrand, IIA, and Microsoft
Corporation. 1994. Windows NT 3.5 Guidelines
for Security, Audit, and Control. Microsoft
Press: Redmond, WA.
-
- Davis, Peter and
Barry Lewis. 1997. Teach Yourself Windows NT
Server 4 in 14 Days. Sams Publishing:
Indianapolis, IN.
-
- Davis, Peter and
Barry Lewis. 1999. Teach Yourself Windows NT
Server 4 in 21 Days. Sams Publishing:
Indianapolis, IN.
-
- Edwards, Mark Joseph.
1997. Internet Security with Windows NT.
Duke Press: Loveland, CO.
-
- Scambray, Joel and
Stuart McClure. 2001. Hacking Windows 2000
Exposed. Osborne/McGraw-Hill: Berkeley, CA.
-
- Sheldon, Tom. 1997. Windows
NT Security Handbook. Osborne McGraw-Hill:
Berkeley, CA.
-
- Sutton, Stephen A.
1997. Windows NT Security Guide.
Addison-Wesley: Reading, MA.
Todd, Chad and Norris L.
Johnson, Jr. 2001. Hack Proofing Windows 2000 Server.
Syngress Publishing: Rockland, MA.
[
Back to Top ]
|