Building an X.500 Directory Service in the US (RFC 1943). B. Jennings, 1996. Available on the World Wide Web at http://www.ietf.org/rfc/rfc1943.txt. Computer Emergency Response Team (CERT) Coordination Center, http://www.cert.org. Counter Hack: A Step-by-Step Guide to Computer Attacks and Effective Defenses . E. Skoudis, Prentice Hall PTR, 2002. Hacking Exposed: Network Security Secrets & Solutions . S. McClure, J. Scambray, and G. Kurtz, McGraw-Hill Professional Publishing, 2001. Internet Cryptography . R. Smith, Addison-Wesley, 1997. Intrusion Detection Hotlist, http://www.cerias.purdue.edu/ coast /ids. Network Intrusion Detection Systems FAQ . Robert Graham, 2000. Available on the World Wide Web at http://www.robertgraham.com/pubs/network-intrusion-detection.html. Privacy on the Line: The Politics of Wiretapping and Encryption . W. Diffie and S. Landau, MIT Press, 1998. Simple Authentication and Security Layer (SASL) (RFC 2222). John Myers, 1997. Available on the World Wide Web at http://www.ietf.org/rfc/rfc2222.txt. The TLS Protocol Version 1.0 (RFC 2246). T. Dierks and C. Allen, 1999. Available on the World Wide Web at http://www.ietf.org/rfc/rfc2246.txt. Understanding Digital Signatures: Establishing Trust over the Internet and Other Networks . G. Grant, McGraw-Hill, 1997. Understanding the Public-Key Infrastructure . C. Adams, S. Lloyd, and S. Kent, New Riders Publishing, 1999. |