www.multicians.org/protection.pdf Protection rings
www.cs.ucsb.edu/~jzhou/security/overflow.html Smashing the stack for fun and profit
www.radium.ncsc.mil/tpep/library/rainbow/NCSC-TG-030.html Covert-channel attacks
www.javaworld.com/javaworld/jw-08-1997/jw-08-hood.html Java security
http://developer.novell.com/research/appnotes/1996/june/netnotes/03.htm How Windows and Novell measure up to TCSEC standards
www.governmentsecurity.org/articles/RainbowSeriesLibraryTheOneTheOnly.php The Rainbow Series
http://infoeng.ee.ic.ac.uk/~malikz/surprise2001/spc99e/article2/ The Bell-LaPadula model
www.iso17799software.com/ ISO 17799
The CISSP Cram Sheet
A Note from Series Editor Ed Tittel
About the Author
Acknowledgments
We Want to Hear from You!
Introduction
Self-Assessment
The CISSP Certification Exam
Physical Security
Security-Management Practices
Access-Control Systems and Methodology
System Architecture and Models
Telecommunications and Network Security
Applications and Systems-Development Security
Operations Security
Business Continuity Planning
Law, Investigations, and Ethics
Cryptography
Practice Exam 1
Answers to Practice Exam 1
Practice Exam 2
Answers to Practice Exam 2