D. Comer, D. Stevens, Internetworking with TCP/IP, volumes 1-3, Prentice Hall, 1991.
W. R. Cheswick & S. M. Bellovin, Firewalls & Internet Security: Repelling the Wily Hacker, Addison-Wesley, 1994.
D. Denning, Cryptography and Data Security, Addison-Wesley, 1982.
Electronic Frontier Foundation, Cracking DES: Secrets of Encryption Research, Wiretap Politics and Chip_Design, O'Reilly & Associates, 1998.
S. Garfinkel, Pretty Good Privacy, O'Reilly Associates, 1994.
A. Hodges, Alan Turing: The Enigma of Intelligence, Simon and Schuster, 1983.
T. Howes, M. Smith, LDAP: Programming Directory-Enabled Applications with Lightweight Directory Access Protocol, Macmillan Technical Publishing, 1997.
C. Huitema, Routing in the Internet, Prentice-Hall, Inc., 1995.
C. Kaufman, R. Perlman, M. Speciner, Network Security: PRIVATE Communication in a PUBLIC World, Prentice-Hall, Inc., 1995.
D. Kosiur, IP Multicasting, Wiley, 1998
X. Lai, On the Design and Security of Block Ciphers, ETH Series in Information Processing, Vol. 1, Konstanz: Hartung-Gorre Verlag, 1992.
R. McEliece, Finite Fields for Computer Scientists and Engineers, Kluwer Academic Publishers, 1987.
B. Schneier, Applied Cryptography, 2nd edition, Wiley, 1996
W.R. Stevens, TCP/IP Illustrated, Volume 1: The Protocols, Addison-Wesley, 1994.
W.R. Stevens, UNIX Network Programming, Prentice-Hall, Inc., 1990.
Gary R. Wright, W. Richard Stevens, TCP/IP Illustrated, Volume 2: The Implementation, Addison-Wesley, 1995.
Top IPSec (2nd Edition) ISBN: 013046189X
EAN: 2147483647 Year: 2004
Pages: 76 Authors: Naganand Doraswamy, Dan Harkins
flylib.com © 2008-2017. If you may any questions please contact us: flylib@qtcs.net |