R. Shirey, "Internet Security Glossary," Request for Comments 2828, May 2000.
D. B. Parker, Fighting Computer Crime: A New Framework for Protecting Information, John Wiley & Sons, New York, 1998.
T. R. Peltier, Information Security Risk Analysis, CRC Press, Boca Raton, FL, 2001.
T. Escamilla, Intrusion Detection: Network Security Beyond the Firewall, John Wiley & Sons, New York, 1998.
E. Amoroso, Intrusion Detection: An Introduction to Internet Surveillance, Correlation, Trace Back, Traps, and Response, Intrusion.Net Books, Sparta, NJ, 1999.
S. Northcutt, D. McLachlan, and J. Novak, Network Intrusion Detection: An Analyst's Handbook, 2nd Edition, New Riders Publishing, Indianapolis, IN, 2000.
M. Cooper, et al., Intrusion Signatures and Analysis, New Riders Publishing, Indianapolis, IN, 2001.
P. E. Proctor, Practical Intrusion Detection Handbook, Prentice Hall, Englewood Cliffs, NJ, 2000.
R. G. Bace, Intrusion Detection, New Riders Publishing, Indianapolis, IN, 1999.
B. Schneier, Secrets and Lies: Digital Security in a Networked World, John Wiley & Sons, New York, 2000.
Team-Fly |