PDA Logo.gif (6595 bytes)

Security & Audit Bibliography


our services

about Peter Davis+Assoc.


security/audit info

Privacy Test

Security & Audit Tools


Security & Audit Products
Top Ten Security Links 
Security & Audit Checklists
Computer & Security
Security & Audit Bibliography
Search Page

legal info

privacy info

[ Business ] [ Cryptography ] [ Firewalls ] [ General Security ] [ Hacking ] [ Internet/Intranet Security ] [ Intrusion Detection ] [ Legal ] [ NetWare Security] [ Network Security ] [ Privacy ] [ Routers and Switches ] [ UNIX/Linux Security ] [ Web Server Security ] [ Windows NT/2000/XP and .NET Security ]

In Association with Amazon.com


Bergeron, Bryan. 2002. Dark Ages II: When the Digital Data Die. Prentice Hall: Upper Saddle River, NJ.
Berners-Lee, Tim with Mark Fischetti. 1999. Weaving the Web. HarperCollins: New York.
Coderre, David G. 1998. CAATTs and other Beasts for Auditors. Global Audit Publications: Vancouver, BC.
Comer, Michael J., Patrick M. Ardis and David H. Price. 1988. Bad Lies in Business. McGraw-Hill: London.
Davis, Stan and Bill Davidson. 1991. 2020 Vision. Simon & Shuster: New York.
Davis, Stanley M. 1987. Future Perfect. Addison-Wesley Publishing Company, Inc.: Reading, MA.
Gelernter, David. 1991. Mirror Worlds or: The Day Software Puts the Universe in a Shoebox...How It Will Happen and What It Will Mean. Oxford University Press, Inc.: New York.
Harris, Robert L. 1996. Information Graphics: A Comprehensive Illustrated Reference. Management Graphics: Atlanta, GA.
Louis, P. J. 2001. M-Commerce Crash Course. McGraw-Hill: New York.
Martin, James. 1995. The Great Transition. Amacom: New York.
Negroponte, Nicholas. 1995. being digital. Vintage Books: New York.
Postman, Neil. 1992. Technopoly: The Surrender of Culture to Technology. Alfred A. Knopf: New York.
Ries, Al. 1996. Focus: The Future of Your Company Depends On It. HarperBusiness: New York.
Stephenson, Neal. 1999. In The Beginning ... Was The Command Line. Avon Books: New York.
Stoll, Clifford. 1999. High Tech Heretic. Doubleday: New York.
Stoll, Clifford. 1996. Silicon Snake Oil : Second Thoughts on the Information Highway.
Anchor Books/Doubleday: New York.

[ Back to Top ]


Bamford, James. 1983. The Puzzle Palace. Penguin Books: New York.
Kippenhahn, Rudolf. 1999. Code Breaking: A History and Exploration. Overlook Press, Woodstock, NY.
Schneier, Bruce. 1994. Applied Cryptography. John Wiley & Son: New York.

Singh, Simon. 1999. The Code Book. Fourth Estate: London.

Smith, Richard E. 1997. Internet Cryptography. Addison-Wesley: Reading, MA.

Wrixon, Fred B. 1998. Codes, Ciphers & Other Cryptic & Clandestine Communication. Black Dog & Leventhal Publishers: New York.

[ Back to Top ]


Alexander, Zubair.  2002.  Microsoft ISA Server 2000.  Sams Publishing: Indianapolis, IN.
Amoroso, Edward and Ronald Sharp. 1996. Intranet and Internet Firewall Strategies. Ziff-Davis Press: Emeryville, CA.
Chapman, D. Brent and Elizabeth D. Zwicky. 1995. Building Internet Firewalls. O'Reilly & Associates, Inc.: Sebastopol, CA.
Cheswick, William R. and Steven M. Bellovin. 1994. Firewalls and Internet Security. Addison-Wesley: Reading, MA.
Fuller, Scott and Kevin Pagan. 1997. Intranet Firewalls. Ventana Communications Group: Research Triangle Park, NC.
Goncalves, Marcus. 1997. Firewalls Complete. McGraw-Hill: New York.
Goncalves, Marcus. 1997. Protecting Your Web Site with Firewalls. Prentice Hall PTR: Upper Saddle River, NJ.
Heldman, William.  2001.  MCSE: ISA Server 2000 Administration Study Guide.  SYBEX: Alameda, CA.
Schuler, Kevin. 1998. Microsoft Proxy Server 2 on site. Coriolis: Scottsdale, AZ.
Shinder, Dr. Thomas W., Debra Littlejohn Shinder and Martin Grasdal.  2001.  Configuring ISA Server 2000: Building Firewalls for Windows 2000.  Syngress Publishing: Rockland, MA.
Siyan, Karanjit S. and Chris Hare. 1995. Internet Firewalls and Network Security. New Riders Publishing: Indianapolis, IN.

[ Back to Top ]

General Security

Alexander, Michael. 1996. The Underground Guide to Computer Security. Addison-Wesley: Reading, MA.
ARCA, edited by. 1993. INFOSEC Handbook. ARCA: San Jose, CA.
Davies, Simon. 1997. Big Brother. Pan Books: London.
Davis, Peter T. and Barry D. Lewis. 1996. Computer Security for Dummies. IDG Books: Foster City, CA.
DeMaio, Harry B. 1992. Information Protection and Other Unnatural Acts. AMACOM: New York.
Flynn, Nancy. 2001. The E-Policy Handbook. AMACOM: New York.
Icove, David; Karl Seger & William VonStorch. 1995. Computer Crime: A Crimefighter's Handbook. O'Reilly & Associates, Inc.: Sebastopol, CA.
Kane, Pamela. 1989. V.I.R.U.S. Protection: Vital Information Resources Under Siege. Bantam Books: New York.
Keen, Peter, Criagg Ballance, Sally Chan and Steve Schrump. 2000. Electronic Commerce Relationships. PH PTR: Upper Saddle River, NJ.
King, Dennis. 1999. Get the Facts on Anyone, 3rd Edition. Macmillan: New York.
Kovacich, Dr. Gerald L. 1998. Information Systems Security Officer's Guide. Butterworth-Heinemann: Woburn, MA.
Levy, Stephen. 1984. Hackers: Heroes of the Computer Revolution. Dell Publishing: New York.
Lundell, Allan. 1989. VIRUS!. Contemporary Books: Chicago.
Middleton, Bruce. 2002. Cyber Crime Investigator's Field Guide. CRC Press: Boca Raton, FL.
National Research Council. 1991. Computers at Risk: Safe Computing in the Information Age. National Academy Press: Washington.
Pipkin, Donald L. 1997. Halting the Hacker: A Practical Guide to Computer Security. Prentice Hall PTR: Upper Saddle River, NJ.
Pipkin, Donald L. 2000. Information Security. Hewlett-Packard Professional Books: Upper Saddle River, NJ.
Schneier, Bruce. 1995. E-Mail Security: How to Keep Your Electronic Messages Private. John Wiley & Son: New York.
Schneier, Bruce. 2000. Secrets and Lies. John Wiley & Son: New York.
Slade, Robert. 1996. Robert Slade's Guide to Computer Virues. Second Edition. Springer: New York.
Solomon, Dr. Alan and Tim Kay. 1994. Dr Solomon's PC Anti-virus Book. New Tech: Oxford.
Tiley, Ed. 1996. Personal Computer Security. IDG Books: Foster City, CA.

[ Back to Top ]


BloomBecker, Buck. 1990. Spectacular Computer Crimes. Dow Jones-Irwin: Homewood, IL.

Bowcott, Owen and Sally Hamilton. 1990. Beating the System: Hackers, Phreakers and Electronic Spies. Bloomsbury Publishing Ltd.: London.
Chirillo, John. 2001. Hack Attacks Denied. John Wiley & Sons, Inc.: New York.
Chirillo, John. 2001. Hack Attacks Revealed. John Wiley & Sons, Inc.: New York.
Cornwall, Hugo. 1990. Data Theft. Mandarin Paperbacks: London.
Cornwall, Hugo. 1988. Hacker's Handbook III. Random Century Ltd.: London.
Cornwall, Hugo. 1991. The Industrial Espionage Book. Random Century Ltd.: London.
Denning, Dorothy E. 1999. Information Warfare and Security. Addison-Wesley: Reading, MA.
Dr. K. 2000. A Complete H@cker's Handbook. Carlton Books: London.
Goodell, Jeff. 1996. The Cyberthief and the Samurai. Dell: New York.
Hafner, Katie and John Markoff. 1991. Cyberpunk: Outlaws and Hackers on the Computer Frontier. Simon & Schuster: New York.
Himanen, Pekka. 2001. The Hacker Ethic and the Spirit of the Information Age. Vintage: London.
Landreth, Bill. 1989. Out of the Inner Circle. Tempus Books: Redmond, WA.
Littman, Jonathan. 1996. The Fugitive Game. Little, Brown & Company: Boston, MA.
Littman, Jonathan. 1997. The Watchman. Little, Brown & Company: Boston, MA.
McAfee, John and Colin Hayes. 1989. Computer Viruses, Worms, Data Diddlers, Killer Programs, and Other Threats to Your System. St. Martin's Press: New York.
McClure, Stuart, Joel Scambray and George Kurtz. 1999. Hacking Exposed. Osborne/McGraw-Hill: Berkeley.
Platt, Charles. 1996. Anarchy Online. Harper Prism: New York.
Russell, Ryan and Stace Cunningham. 2000. Hack Proofing Your Network: Internet Tradecraft. Syngress:Rockland, MA.
Schwartau, Winn. 2000. Cybershock: Surviving Hackers, Phreakers, Identity Thieves, Internet Terrorists and Weapons of Mass Disruption. Thunder's Mouth Press: New York.
Schwartau, Winn. 1994. Information Warfare. Thunder's Mouth Press: New York.
Schwartau, Winn. 1991. Terminal Compromise. Inter*Pact Press: U.S.
Shimomura, Tsutomu and John Markoff. 1996. Takedown. Hyperion: New York.
Slatalla, Michelle and Joshua Quittner. 1995. Masters of Deception: The Gang that Ruled Cyberspace. Harper Collins Publishers: New York.
Sterling, Bruce. 1992. The Hacker Crackdown. Bantam Books: New York.
Stoll, Clifford. 1989. The Cuckoo's Egg. Doubleday: New York.
The Knightmare. 1994. Secrets of a Super Hacker. Loompanics Unlimited: Port Townsend, WA.
Wang, Wallace. 2001. Steal This Computer Book 2. No Starch Press: San Francisco.
Winkler, Ira. 1997. Corporate Espionage. Prima Publishing: Rocklin, CA.

[ Back to Top ]

Internet/Intranet Security

Ahuja, Vijay. 1996. Network and Internet Security. Academic Press, Inc.: Boston.
Ahuja, Vijay. 1997. Secure Commerce on the Internet. Academic Press Professional: Boston.
Atkins, Derek; Paul Buis et al. 1996. Internet Security: Professional Reference. New Riders: Indianapolis, IN.
Bahadur, Gary, William Chan and Chris Weber.  2002.  Privacy Defended: Protecting Yourself Online.  Que: Indianapolis, IN.
Barrett, Daniel J. 1996. Bandits on the Information Superhighway. O'Reilly & Associates, Inc.: Sebastopol, CA.
Bernstein, Terry; Anish B. Bhimani; Eugene Schultz and Carol A. Siegel. 1996. Internet Security for Business. John Wiley & Sons, Inc.: New York.
Cohen, Frederick B. 1995. Protection and Security on the Information Superhighway. John Wiley & Sons, Inc.: New York.
Cole, Eric. 2001. Hackers Beware. New Riders: Indianapolis, IN.
Cooper, Frederic J., et al. 1995. Implementing Internet Security. New Riders Publishing: Indianapolis.
Crothers, Tim.  2001.  Internet Lockdown: Internet Security Administrator's Handbook.  Hungry Minds: New York, NY.
Crume, Jeff. 2000. Inside Internet Security. Addison-Wesley: Harlow, GB.
Dahl, Andrew and Leslie Lesnick. 1996. Internet Commerce. New Riders: Indianapolis, IN.
Danesh, Arman, Ali Mehrassa and Felix Lau. 2002. Safe and Secure. Sams Publishing: Indianapolis, IN.
Davis, Peter T. 1994. Manager's Guide to Internet Security. CSI: San Francisco.
Edwards, Mark Joseph. 1998. Internet Security with Windows NT. Duke Press: Loveland, CO.
Freiss, Martin. 1997. Protecting Networks with SATAN. O'Reilly & Associates, Inc.: Sebastopol, CA.
Hahn, Harley. 2002. Harley Hahn's Internet InSecurity. Prentice Hall: Upper Saddle River, NJ.
Hare, Chris, and Karanjit Siyan. 1996. Internet Firewalls and Network Security. New Riders Publishing: Indianapolis, IN.
Howard, Garry S. 1995. Introduction to Internet Security: From Basics to Beyond. Prima Online: Rocklin, CA.
Hughes Jr., Larry J. 1995. Actually Useful Internet Security Techniques. New Riders: Indianapolis, IN.
Kyas, Othmar. 1997. Internet Security. International Thomson Computer Press: London.
Lynch, Daniel C. and Leslie Lundquist. 1996. Digital Money: The New Era of Internet Commerce. John Wiley & Son: New York.
Mansfield, Richard.  2000.  Hacker Attack!.  Sybex: San Francisco, CA.
McCarthy, Linda. 1998. Intranet Security: Stories from the Trenches. Sun Microsystems Press: Mountain View, CA.
McMahon, David. 2000. Cyber Threat: Internet Security for Home and Business. Warwick Publishing Inc.: Toronto.
Pabrai, Uday O. and Vijay K. Gurbani. 1996. Internet & TCP/IP Network Security. McGraw-Hill: New York.
Randall, Neil. 1995. Teach Yourself the Internet in a Week. Sams.Net: Indianapolis, IN.
Schwartau, Winn and Chris Goggans. 1996. The Complete Internet Business Toolkit. Van Nostrand Reinhold: New York.
Schweitzer, Douglas.  2002.  Internet Security Made Easy.  AMACOM: New York.
Stallings, William. 1995. Internet Security Handbook. IDG Books: Foster City, CA.
Stallings, William; Peter Stephenson et al. 1995. Implementing Internet Security. New Riders Publishing: Indianapolis, IN.
Vacca, John. 1996. Internet Security Secrets. IDG Books: Foster City, CA.
Vacca, John. 1997. Intranet Security. Charles River Media, Inc.: Rockland, MA.
Various. 2001. Security Complete. SYBEX: Alameda, CA.
Weiss, Aaron. 1995. The Complete Idiot's Guide to Protecting Yourself on the Internet. Que: Indianapolis, IN.

[ Back to Top ]

Intrusion Detection

Amoroso, Edward. 1999. Intrusion Detection: An Introduction to Internet Surveillance, Correlation, Trace Back, Traps, and Repsonse. Intrusion.Net Books: Sparta, NJ.
Bace, Rebecca Gurley. 2000. Intrusion Detection. Macmillan Technical Publishing: Indianapolis, IN.
Escamilla, Terry. 1998. Intrusion Detection. John Wiley & Sons: New York.

Murray, James D. 1998. Windows NT Event Logging. O'Reilly:Sebastopol, CA.

Northcutt, Stephen. 1999. Network Intrusion Detection: An Analyst's Handbook. New Riders: Indianapolis, IN.

Northcutt, Stephen, Mark Cooper, Matt Fearnow and Karen Frederick. 2001. Intrusion Signatures and Analysis. New Riders: Indianapolis, IN.

Proctor, Paul E. 2001. The Practical Intrusion Detection Handbook. PH PTR:Upper Saddle River, NJ.

[ Back to Top ]


Johnston, David; Sunny Handa and Charles Morgan. 1997. Cyberlaw. Stoddart Publishing: Toronto.
Overly, Michael R. 1999. e-policy: How to Develop Computer, E-mail, and Internet Guidelines to Protect Your Company and Its Assets. AMACOM: New York.
Rose, Lance. 1995. NetLaw: Your Rights in the Online World. McGraw-Hill: New York.
Schelling, Jeffrey M. 1998. Cyberlaw Canada. Self-Counsel Press: North Vancouver, BC.

[ Back to Top ]

NetWare Security

Sawicki, Ed. 1992. LAN Desktop Guide to Security NetWare Edition. Sams Publishing: Carmel, IN.
Steen, William and Doug Bierer. 1996. NetWare Security. New Riders: Indianapolis, IN.

[ Back to Top ]

Network Security

Alexander, Michael. 1997. Net Security: Your Digital Doberman. Ventana Communications Group: Research Triangle Park, NC.
Anonymous. 1997. Maximum Security: A Hacker's Guide to Protecting Your Internet Site and Network. Sams Publishing: Indianapolis, IN.
Ballew, Scott M. 1997. Managing IP Networks with Cisco Routers. O'Reilly & Associates, Inc.: Sebastopol, CA.
Brenton, Chris with Cameron Hunt. 2001. Active Defense: A Comprehensive Guide to Network Security. Sybex: San Francisco.
Davis, Peter T. Editor. 1996. Securing Client/Server Computer Networks. McGraw-Hill: New York.
Hu, Wei. 1995. DCE Security Programming. O'Reilly & Associates, Inc.: Sebastopol, CA.
Hunt, Craig. 1992. TCP/IP Network Administration. O'Reilly & Associates, Inc.:Sebastopol, CA.
Klander, Lars. 1997. Hacker Proof: The Ultimate Guide to Network Security. Jamsa Press: Las Vegas, NV.
Kosiur, Dave. 1998. Building and Managing Virtual Private Networks. John Wiley & Sons: New York.
Murhammer, Martin W., Tim A. Bourne, Tamas Gaidosch, Charles Kunzinger, Laura Rademacher and Andreas Weinfurter. 1998. A Guide to Virtual Private Networks. PH PTR: Upper Saddle River, NJ.
Simonds, Fred. 1996. Network Security: Data and Voice Communications. McGraw-Hill: New York.
Stallings, William. 1995. Network and Internetwork Security. Prentice Hall: Englewood Cliffs, CA.
Stang, David J. and Sylvia Moon. 1993. Network Security Secrets. IDG Books: San Mateo, CA.

[ Back to Top ]


A Michael Wolff Book. 1996. How You Can Access the Facts and Cover Your Tracks. Wolff New Media: New York.
Bacard, Andre. 1995. The Computer Privacy Handbook. Peachpit Press: Berkeley, CA.
Banks, Michael A. 2000. PC Confidential. Sybex: Alameda, CA.
Banks, Michael A. 1997. Web Psychos and Stalkers and Pranksters. Coriolis Group Books: Albany, NY.
Cavoukian, Ann and Don Tapscott. 1995. Who Knows: Safeguarding your privacy in a networked world. Random House of Canada: Toronto.
Goncalves, Marcus et al. 1997. Internet Privacy Kit. Que: Indianapolis, IN.
Pfaffenberger, Bryan. 1997. Protect Your Privacy on the Internet. John Wiley & Sons: New York.

[ Back to Top ]

Routers and Switches

Ballew, Scott M. 1997. Managing IP Networks with Cisco Routers. O'Reilly: Sebastopol, CA.

Chappell, Laura A. 2000. Basic TCP/IP LAN Configurations. podbooks.com: San Jose, CA.

Ciccarelli, Patrick and Christina Faulkner. 1999. CCNA Jumpstart. Sybex: San Francisco.

Cisco Documentation. 1999. Cisco IOS 12.0 Network Security. Cisco Press:Indianapolis, IN.

Davis, Peter T. 2002. Securing and Controlling Cisco Routers. Auerbach/CRC Press: Boca Raton, FL.

Hamilton, Andrew, John Mistichelli with Bryant G. Tow. 2000. Cisco Routers 24seven. Sybex: San Francisco.

Held, Gil and Kent Hundley. 2000. Cisco Access Lists Field Guide. McGraw-Hill: New York.

Held, Gil and Kent Hundley. 1999. Cisco Security Architectures. McGraw-Hill: New York.

Lammle, Todd and William Tedder. 2000. CCNA Virtual Lab e-trainer. Sybex: San Francisco.

Lewis, Chris. 1997. Cisco TCP/IP Routing Professional Reference. McGraw-Hill: New York.

Lusignan, Russell, Olivier Steudler and Jacques Allison. 2000. Managing Cisco Network Security. Syngress: Rockland, MA.

Mason, Andrew G. and Mark J. Newcomb. 2001. Cisco Secure Internet Security Solutions. Cisco Press: Indianapolis, IN.

Odom, Wendell. 1999. CCNA Exam Certification Guide. Cisco Press: Indianapolis, IN.

Rees, Matthew J. and Jeffrey T. Coe. 1999. Routing and Switching. Coriolis: Scottsdale, AZ.

Sedayo, Jeff. 2001. Cisco IOS Access Lists. O'Reilly: Sebastopol, CA.

Seifert, Rich. 2000. The Switch Book. Joh Wiley & Sons, Inc.: New York.

Shaughnessy, Tom. 2000. Cisco: A Beginner's Guide. Osborne/McGraw-Hill: Berkeley, CA.

Syngress Media, Inc. 1999. Cisco CCNA Test Yourself Practice Exams. Osborne/McGraw-Hill: Berkeley, CA.

[ Back to Top ]

UNIX/Linux Security

Anderson, Bart, et al. 1995. The Waite Group's UNIX Communications and the Internet. Sams Pub.: Indianapolis, IN.
Barkakati, Naba. 2001. Linux Weekend Crash Course. Hungry Minds, Inc.: New York.
Braun, Christoph. 1995. UNIX System Security Essentials. Addison-Wesley: Reading, MA.
Curry, D. 1992. UNIX System Security - A Guide for Users and System Administrators. Addison-Wesley: Reading, MA.
DeRoest, James. 1995. AIX RS/6000 System and Administration Guide. McGraw-Hill: New York, NY.
Farrow, Rik. 1991. UNIX Systems Security. Addison-Wesley: Reading, MA.
Ferbrache, David and Gavin Shearer. 1993. UNIX Installation Security and Integrity. Prentice Hall PTR: Indianapolis, IN.
Garfinkel, Simson and Gene Spafford. 1996. Practical UNIX & Internet Security. O'Reilly & Associates, Inc.:Sebastopol, CA.
Gregory, Peter H. 2000. Solaris Security. Sun Microsystems Press/Prentice Hall: Upper Saddle River, NJ.
Grottola, Michael G. 1993. The UNIX Audit: Using UNIX to Audit UNIX. McGraw-Hill: New York.
Miles, Wyman; Ed Mitchell; F. William Lynch and Randy Cook. 2001. Hack Proofing Linux. Syngress Publishing: Rockland, MA.
Stanger, James; Patrick T. Lane and Edgar Danielyan. 2001. Hack Proofing Sun Solaris 8. Syngress Publishing: Rockland, MA.
Wood, Patrick H. and Stephen G. Kochan. 1988. UNIX System Security. Hayden Books: Indianapolis, IN.

[ Back to Top ]

Web Server Security

Garfinkel, Simson and Gene Spafford. 1997. Web Security & Commerce. O'Reilly & Associates, Inc.: Sebastopol, CA.

Liu, Cricket; Jerry Peek, Russ Jones, Bryan Buus, and Adrian Nye. 1994. Managing Internet Information Services. O'Reilly & Associates, Inc.: Sebastopol, CA.

MacGregor, Robert S., Alberto Aresi and Andreas Siegert. 1996. www.security. Prentice Hall PTR: Upper Saddle River, NJ.
McGraw, Gary and Edward W. Felten. 1997. Java Security. Wiley Computer Publishing: New York.

Rescoria, Eric. 2001. SSL and TLS: Designing and Building Secure Systems. Addison-Wesley: Boston.

Rubin, Aviel D.; Daniel Geer and Marcus J. Ranum. 1997. Web Security Sourcebook. John Wiley & Son: New York.

Stein, Lincoln D. 1998. Web Security: A Step-by-Step Reference Guide. Addison-Wesley: Reading, MA.

[ Back to Top ]

Windows NT/2000/XP and .NET Security

Citibank N.A., Coopers & Lybrand, IIA, and Microsoft Corporation. 1994. Windows NT 3.5 Guidelines for Security, Audit, and Control. Microsoft Press: Redmond, WA.
Davis, Peter and Barry Lewis. 1997. Teach Yourself Windows NT Server 4 in 14 Days. Sams Publishing: Indianapolis, IN.
Davis, Peter and Barry Lewis. 1999. Teach Yourself Windows NT Server 4 in 21 Days. Sams Publishing: Indianapolis, IN.
Edwards, Mark Joseph. 1997. Internet Security with Windows NT. Duke Press: Loveland, CO.
Scambray, Joel and Stuart McClure. 2001. Hacking Windows 2000 Exposed. Osborne/McGraw-Hill: Berkeley, CA.
Sheldon, Tom. 1997. Windows NT Security Handbook. Osborne McGraw-Hill: Berkeley, CA.
Sutton, Stephen A. 1997. Windows NT Security Guide. Addison-Wesley: Reading, MA.

Todd, Chad and Norris L. Johnson, Jr. 2001. Hack Proofing Windows 2000 Server. Syngress Publishing: Rockland, MA.

[ Back to Top ]