References


[1] Oppliger, R., Internet and Intranet Security, Second Edition , Norwood, MA: Artech House, 2002.

[2] Shirey, R., ˜ ˜Internet Security Glossary, Request for Comments 2828, May 2000.

[3] Parker, D. B., Fighting Computer Crime: A New Framework for Protecting Information , New York: John Wiley & Sons, 1998.

[4] Peltier, T. R., Information Security Risk Analysis , Boca Raton, FL: CRC Press, 2001.

[5] Escamilla, T., Intrusion Detection: Network Security Beyond the Firewall , New York: John Wiley & Sons, 1998.

[6] Amoroso, E., Intrusion Detection: An Introduction to Internet Surveillance, Correlation, Trace Back, Traps, and Response , Sparta, NJ: Intrusion.net Books, 1999.

[7] Northcutt, S., D. McLachlan, and J. Novak, Network Intrusion Detection: An Analyst s Handbook , 2nd ed., Indianapolis, IN: New Riders Publishing, 2000.

[8] Cooper, M., et al., Intrusion Signatures and Analysis , Indianapolis, IN: New Riders Publishing, 2001.

[9] Proctor, P. E., Practical Intrusion Detection Handbook , Englewood Cliffs, NJ: Prentice Hall, 2000.

[10] Bace, R. G., Intrusion Detection , Indianapolis, IN: New Riders Publishing, 1999.

[11] Schneier, B., Secrets and Lies: Digital Security in a Networked World , New York: John Wiley & Sons, 2000.




Security Technologies for the World Wide Web
Security Technologies for the World Wide Web, Second Edition
ISBN: 1580533485
EAN: 2147483647
Year: 2003
Pages: 142
Authors: Rolf Oppliger

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net