Further Reading

   

Building an X.500 Directory Service in the US (RFC 1943). B. Jennings, 1996. Available on the World Wide Web at http://www.ietf.org/rfc/rfc1943.txt.

Computer Emergency Response Team (CERT) Coordination Center, http://www.cert.org.

Counter Hack: A Step-by-Step Guide to Computer Attacks and Effective Defenses . E. Skoudis, Prentice Hall PTR, 2002.

Hacking Exposed: Network Security Secrets & Solutions . S. McClure, J. Scambray, and G. Kurtz, McGraw-Hill Professional Publishing, 2001.

Internet Cryptography . R. Smith, Addison-Wesley, 1997.

Intrusion Detection Hotlist, http://www.cerias.purdue.edu/ coast /ids.

Network Intrusion Detection Systems FAQ . Robert Graham, 2000. Available on the World Wide Web at http://www.robertgraham.com/pubs/network-intrusion-detection.html.

Privacy on the Line: The Politics of Wiretapping and Encryption . W. Diffie and S. Landau, MIT Press, 1998.

Simple Authentication and Security Layer (SASL) (RFC 2222). John Myers, 1997. Available on the World Wide Web at http://www.ietf.org/rfc/rfc2222.txt.

The TLS Protocol Version 1.0 (RFC 2246). T. Dierks and C. Allen, 1999. Available on the World Wide Web at http://www.ietf.org/rfc/rfc2246.txt.

Understanding Digital Signatures: Establishing Trust over the Internet and Other Networks . G. Grant, McGraw-Hill, 1997.

Understanding the Public-Key Infrastructure . C. Adams, S. Lloyd, and S. Kent, New Riders Publishing, 1999.

   


Understanding and Deploying LDAP Directory Services
Understanding and Deploying LDAP Directory Services (2nd Edition)
ISBN: 0672323168
EAN: 2147483647
Year: 2002
Pages: 242

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net