-
Schneier, Bruce, Secrets and Lies: Digital Security in a Networked World (Hoboken, NJ: John Wiley & Sons, 2000). -
Kovar, Matthew, "Network Security Industry Must Undergo Fundamental Paradigm Shift in Order to Evolve," Yankee Group news release, July 16, 2001, http://about.reuters.com/newsreleases/art_16-7-2001_id659.asp. -
Freeman, David, "Information Warfare," MIT Technology Review 104, no. 9, pp. 6167, November 2001, http://www.technologyreview.com/articles/freedman1101.asp. -
Thompson, Todd, "Where Did All My Bandwidth Go?" SANS Institute Reading Room, June 18, 2001, http://www.giac.org/practical/gsec/Todd_Thompson_GSEC.pdf (p.1). -
Graham, Robert, "FAQ: Network Intrusion Detection Systems," http://www.robertgraham.com/pubs/network-intrusion-detectionhtml. -
The Honey Project, "What a Honeynet Is," in Know Your Enemy: Revealing the Security Tools, Tactics, and Motives of the Blackhat Community (Boston: Addison-Wesley, 2001). -
"vomitVoice over Misconfigured Internet Telephones," a software program by Niels Provos. Web page: http://vomit.xtdnet.nl/. -
Swart, Marius, "The Enemy Within: Don't Overlook Internal Security," ITWeb, July 18, 2001, http://www.itweb.co.za/sections/techforum/2001/0107180819.asp. -
Taylor, David, "Are there Vulnerabilities in VLAN Implementations?" SANS Institute resources, July 12, 2000, http://www.sans.org/newlook/resources/IDFAQ/vlan.php. -
SANS Institute, "The SANS Top 20 Internet Security Vulnerabilities" SANS Institute resources, http://www.sans.org/top20/. -
"The Ten Immutable Laws of Security," Microsoft Corporation, http://www.microsoft.com/technet/columns/security/10imlaws.asp. -
Hochmuth, Phil, "Is VoIP Vulnerable?" Network World, June 24, 2002, http://www.nwfusion.com/news/2002/0624voip.html. -
Gates, Bill, e-mail of January 15, 2002, "Subject: Trustworthy computing," http://news.com.com/2009-1001-817210.html?legacy=cnet. | | |