Team LiB   Previous Section   Next Section

Network Security Guides

Allen, Julia and Kossakowski, Klaus-Peter. Securing Network Servers (CMU/SEI-SIM-010, ADA 379469). Pittsburgh, PA: Software Engineering Institute, Carnegie Mellon University, 2000. Available online: <http://www.cert.org/security-improvement/modules/m10.html>.

Ford, Gary et al. Securing Network Servers (CMU/SEI-SIM-007, ADA 361387). Pittsburgh, PA: Software Engineering Institute, Carnegie Mellon University, 1999. Available online: <http://www.cert.org/security-improvement/modules/m07.html>.

Internet Engineering Task Force, Network Working Group. Guidelines for the Secure Operation of the Internet (RFC 1281). Available online: <http://www.isi.edu/in-notes/rfc1281.txt> (1991).

Internet Engineering Task Force, Site Security Policy Handbook Working Group. Site Security Handbook (RFC 2196, FYI 8). Available online: <http://www.isi.edu/in-notes/rfc2196.txt> (1997).

National Institute of Standards and Technology. Internet Security Policy: A Technical Guide. Washington, DC: National Institute of Standards and Technology. Available online: <http://csrc.nist.gov/isptg> (1998).

Kabay, Michel E. The NCSA Guide to Enterprise Security: Protecting Information Assets. New York: McGraw-Hill, 1996.

Northcutt, Stephen. Network Intrusion Detection: An Analyst's Handbook. Indianapolis, IN: New Riders Publishing, Macmillan, 1999.

    Team LiB   Previous Section   Next Section