O'Reilly logo

The Craft of System Security by Sean Smith, John Marchesini

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Bibliography

This bibliography lists the papers, books, and Web publications cited in the book. This list is comprehensive, in that we have tried to paint a complete picture of system security, and these are its supporting citations. However, this list is certainly not exhaustive. We have cited works that were historically relevant or gave more detail on a topic or were good examples of the idea being discussed. However, by no means could we cite all important works in the literature—that bibliography alone would take another book.

[AA04]

D. Atkins and R. Autstein. RFC 3833: Threat Analysis of the Domain Name System (DNS), August 2004. www.ietf.org/rfc/rfc3833.txt.

[AAL+05a]

R. Arends, R. Autstein, M. Larson, D. Massey, and S. Rose. RFC 4033: ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required