Section 20.4. Recommended Reading and Web Sites


[Page 644 (continued)]

20.4. Recommended Reading and Web Sites

A classic treatment of firewalls is [CHAP00]. Another classic, recently updated, is [CHES03]. [LODI98], [OPPL97], and [BELL94b] are good overview articles on the subject. [WACK02] is an excellent overview of firewall technology and firewall policies. [AUDI04] and [WILS05] provide useful discussions of firewalls.

[GASS88] provides a comprehensive study of trusted computer systems. [PFLE03] and [GOLL99] also provide coverage. [FELT03] and [OPPL05] provide useful discussions of trusted computing.


[Page 645]

AUDI04 Audin, G. "Next-Gen Firewalls: What to Expect." Business Communications Review, June 2004.

BELL94b Bellovin, S., and Cheswick, W. "Network Firewalls." IEEE Communications Magazine, September 1994.

CHAP00 Chapman, D., and Zwicky, E. Building Internet Firewalls. Sebastopol, CA: O'Reilly, 2000.

CHES03 Cheswick, W., and Bellovin, S. Firewalls and Internet Security: Repelling the Wily Hacker. Reading, MA: Addison-Wesley, 2003.

FELT03 Felten, E. "Understanding Trusted Computing: Will Its Benefits Outweigh Its Drawbacks?" IEEE Security and Privacy, May/June 2003.

GASS88 Gasser, M. Building a Secure Computer System. New York: Van Nostrand Reinhold, 1988.

GOLL99 Gollmann, D. Computer Security. New York: Wiley, 1999.

LODI98 Lodin, S., and Schuba, C. "Firewalls Fend Off Invasions from the Net." IEEE Spectrum, February 1998.

OPPL97 Oppliger, R. "Internet Security: Firewalls and Beyond." Communications of the ACM, May 1997.

OPPL05 Oppliger, R., and Rytz, R. "Does Trusted Computing Remedy Computer Security Problems?" IEEE Security and Privacy, March/April 2005.

PFLE03 Pfleeger, C. Security in Computing. Upper Saddle River, NJ: Prentice Hall, 1997.

WACK02 Wack, J.; Cutler, K.; and Pole, J. Guidelines on Firewalls and Firewall Policy. NIST Special Publication SP 800-41, January 2002.

WILS05 Wilson, J. "The Future of the Firewall."Business Communications Review, May 2005.


Recommended Web Sites

  • Firewall.com: Numerous links to firewall references and software resources.

  • Trusted Computing Group: Vendor group involved in developing and promoting trusted computer standards. Site includes white papers, specifications, and vendor links.

  • Common Criteria Portal: Official Web site of the common criteria project.




Cryptography and Network Security Principles and Practices
Cryptography and Network Security (4th Edition)
ISBN: 0131873164
EAN: 2147483647
Year: 2005
Pages: 209

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net