The Internet Storm Center: http://isc.incidents.org. Denial of Service Attacks: www.cert.org/tech_tips/denial_of_service.html. Unauthorized P2P Use Risky for Businesses: www.idg.net/ic_1326812_9677_1-5044.html. Allen, Julia H. The CERT Guide to System and Network Security Practices . Boston: Addison-Wesley, 2001. Hines, Annlee A. Planning for Survivable Networks . Indianapolis, Indiana: Wiley Publishing, Inc. 2002. McCarthy, Mary Pat and Stuart Campbell. Security Transformation: Digital Defense Strategies to Protect Your Company's Reputation & Market Share . New York: McGraw-Hill, 2001. Mitnick, Kevin. The Art of Deception: Controlling the Human Element of Security . Indianapolis, Indiana: Wiley Publishing, Inc. 2002. Power, Richard. Tangled Web: Tales of Digital Crime from the Shadows of Cyberspace . Indianapolis, Indiana: Que, 2000. |