Caswell, Brian, Jay Beale, James C. Foster, and Jeffrey Posluns. 2003. Snort 2.0 Intrusion Detection . Rockland, MA: Syngress. Cisco Internetwork Basics: www.idevelopment. info /data/Networking/Networking_Basics/BASICS_Understanding_OSI_Model.shtml Drummond, Richard. 1993. Data Communications for the Office . New York: Bantam Professional Books. EMACS quick reference: http://seamons.com/emacs/ Hafner, Katie and John Markoff. 1991. Cyberpunk: Outlaws and Hackers on the Computer Frontier . New York: Simon and Schuster. Introduction to Cryptography, Network Associates: www.pgpi.org/doc/pgpintro/ Krutz, Ronald L. and Russell Dean Vines. 2001. The CISSP Prep Guide . New York: John Wiley & Sons. Lammle, Todd. 2003. CCNA Cisco Certified Network Associate Study Guide, Fourth Edition. Location: San Francisco: Sybex. Levy, Steven. 2002. Crypto: How the Code Rebels Beat the Government Saving Privacy in the Digital Age . New York: Penguin Putnam Inc. Marcus, J. Scott. 1999. Designing Wide Area Networks and Internetworks: A Practical Guide . Boston: Addison-Wesley. The OSI Model: www.wdsd.org/strut/OSI/osimodel.html Scambray, Joel, Stuart McClure, and George Kurtz. 2001. Hacking Exposed , Second Edition. New York: McGraw Hill. Schneier, Bruce. 1995. Applied Cryptography: Protocols, Algorithms, and Source Code in C , Second Edition. Hoboken, NJ: John Wiley & Sons. Schultz, E. Eugene. 2000. Windows NT/2000 Network Security . New York: MacMillan Technical Publishing. Singh, Simon. 2000. The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography . London: Anchor Books. Smith, Richard E. 2001. Authentication: From Passwords to Public Keys . Boston: Addison-Wesley. Stanger, James, Patrick T. Lane, and Edgar Danielyan. 2001. Hackproofing Linux . Rockland, MA: Syngress. Torvalds, Linus and David Diamond. 2002. Just for Fun: The Story of an Accidental Revolutionary . New York: HarperBusiness. |