Guidance on Information Classification: www.fbtechies.co.uk/Downloads/CLASSY.pdf. A Security Tool Identification Approach: www.sei.cmu.edu/ publications /documents/97. reports /97tr009/97tr009chap03.htm. Allen, Julia H. The CERT Guide to System and Network Security Practices . Boston: Addison-Wesley, 2001. Hines, Annlee A. Planning for Survivable Networks . Indianapolis, Indiana: Wiley Publishing, Inc., 2002. Wadlow, Thomas. The Process of Network Security . Boston: Addison-Wesley, 2000. Walsh, James. Asset Protection and Security Management Handbook . Boca Raton, Florida: Auerbach Publications, 2002. |