|< Day Day Up >|| |
The Center for Internet Security. Available online: www.cisecurity.org/. (The Center’s mission is to help organizations around the world effectively manage the risks related to information security. CIS provides methods and tools to improve, measure, monitor and compare the security status of your Internet-connected systems and appliances, plus those of your business partners. CIS is not tied to any proprietary product or service. It manages a consensus process whereby members identify security threats of greatest concern, then participate in development of practical methods to reduce the threats. This consensus process is already in use and has proved viable in creating Internet security benchmarks available for widespread adoption.)
Computer Crime and Security Survey. Available online: http://www.gocsi.com/press/20020407.html.
In Pursuit of the User Friendly, Impenetrable, Tamperproof, Impregnable Firewall Gelb Organization. (1998). Available online: http://www.gelb.com/chapter.htm.
Intruder Detection Checklist. Available online: http://www.cert.org/tech_tips/intruder_detection_checklist.html .
Network vs. Host-Based Intrusion Detection: A guide to Intrusion Detection Technology. Available onlin: http://secinf.net/info/ids/nvh_ids/ .
Pace, N. (1998, November). What Firewalls Can (and Can’t) Do For You. Available online: http://www.ne-dev.com/ned-02-1998/ned-02-firewall.html .
Ranum, M. J. Intrusion Detection: Challenges and Myths. Available online: http://secinf.net/info/ids/ids_mythe.html.
San Francisco State University - College of Extended Learning. Available online: http://msp.sfsu.edu/instructors/jlevin/security/security_toc.html.
Schupp, S. Limitations of Network Intrusion Detection. Available online: http://www.sans.org/infosecFAQ/intrusion/net_id.htm.
Shipley, G. Watching the Watchers: Intrusion Detection. Available online: http://www.networkcomputing.com/1122/1122f3.html.
State of the Practice of Intrusion Detection Technologies. Available online: http://www.sei.cmu.edu/publications/documents/99.reports/99tr028/99tr028exsum.html .
Stateful Inspection Firewall Technology: Tech Note. (1998). Available online: http://www.checkpoint.com/products/technology/stateful1.html .
UNIX Configuration Guidelines. Available online: http://www.cert.org/tech_tips/unix_configuration_guidelines.html .
UNIX Security Checklist v2.0. Available online: http://www.cert.org/tech_tips/unix_security/checklist2.0.html .
Wack, J. & Carnahan, L. (1995, February). Keeping Your Site Comfortably Secure: An Introduction to Internet Firewalls. NIST Special Publication 800-10. Avaiable online: http://csrc.ncsl.nist.gov/nistpubs/800-10/main.html .
Windows NT Configuration Guidelines. Available online: http://www.cert.org/tech_tips/win_configuration_guidelines.html.
|< Day Day Up >|| |