9.2 Preparation


9.2 Preparation

To be able to understand and apply the concepts in this chapter, you should be familiar with the basic concepts and mechanisms of security. Some recommended sources of information include:

  • Hacking Exposed: Network Security Secrets & Solutions, 3rd edition, by Stuart McClure, Joel Scambray, George Kurtz, McGraw-Hill Osborne Media, September 2001

  • Information Security Architecture: An Integrated Approach to Security in the Organization, by Jan Killmeyer Tudor, CRC Press, September 2000

  • Firewalls and Internet Security, William R. Cheswick and Steven M. Bellovin, Addison-Wesley Publishing, January 1994

  • Inside Network Perimeter Security: The Definitive Guide to Firewalls, Virtual Private Networks (VPNs), Routers, and Intrusion Detection Systems, by Stephen Northcutt, Karen Fredrick, Scott Winters, Lenny Zeltser, and Ronald W. Ritchey, New Riders Publishing, June 2002

  • Computer Security Handbook, by Seymour Bosworth and Michel Kabay, John Wiley & Sons, April 2002




Network Analysis, Architecture and Design
Network Analysis, Architecture and Design, Second Edition (The Morgan Kaufmann Series in Networking)
ISBN: 1558608877
EAN: 2147483647
Year: 2003
Pages: 161

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net