August 2000
Intermediate to advanced
896 pages
28h 17m
English
BRYANT, WILLIAM. “Designing an Authentication System: a Dialogue in Four Scenes.” web.mit.edu/kerberos/www/dialogue.html
CERT COORDINATION CENTER. “Intruder Detection Checklist.” www.cert.org/tech_tips/intruder_detection_checklist.html
CERT COORDINATION CENTER. “UNIX Configuration Guidelines.” www.cert.org/tech_tips/unix_configuration_guidelines.html
CHESWICK, WILLIAM R., AND STEVEN M. BELLOVIN. Firewalls and Internet Security, Second Edition. Reading, MA; Addison-Wesley. 2000.
CURTIN, MATT, AND MARCUS RANUM. “Internet Firewalls: Frequently Asked Questions.” www.interhack.net/pubs/fwfaq
FARMER, DAN, AND WIETSE VENEMA. “Improving the Security of Your Site by Breaking Into it.” 1993. www.fish.com/security
FRASER, B., ...
Read now
Unlock full access