References


1 Laura Chappell and Roger Spicer . "Is Your Network Doomed?" NetWare Connection. http://www.nwconnection.com/jan-feb.96/doomed/. December 2001.

2 Microsoft Corporation. "Exchange Server 2003 and Exchange 2000 Front-End and Back-End Topology." July 29, 2004. http://www.microsoft.com/technet/prodtechnol/exchange/2003/library/febetop.mspx. August 25, 2004.

3 National Infrastructure Protection Center. "Lion Internet Worm DDoS Targeting Unix Systems." Advisory 01-005. March 23, 2001. http://www.nipc.gov/warnings/advisories/_2001/01-005.htm. December 2001.

4 Global Incident Analysis Center. "Lion Worm." April 18, 2001. http://www.sans.org/_y2k/lion.htm. December 2001.

5 CERT Coordination Center. "Microsoft Windows NT and 2000 Domain Name Servers Allow Nonauthoritative RRs to Be Cached by Default." Vulnerability Note VU#109475. http://www.kb.cert.org/vuls/id/109475. December 2001.

6 Microsoft Corporation. "How to Prevent DNS Cache Pollution (Q241352)." September 10, 1999. http://support.microsoft.com/support/kb/articles/Q241/3/52.ASP. December 2001.

7 Cisco. "System Requirements to Implement MLS." http://www.cisco.com/warp/public/_473/55.html. December 2001.

8 IEEE. "IEEE Standards for Local and Metropolitan Area Networks: Virtual Bridged Local Area Networks." IEEE Standard 802.1Q-1998. http://standards.ieee.org/reading/ieee/std/_lanman/802.1Q-1998.pdf. December 2001.

9 David Taylor . "Are There Vulnerabilities in VLAN Implementations?" July 12, 2001. http://www.sans.org/newlook/resources/IDFAQ/vlan.htm. December 2001.

10 David Pollino and Mike Schiffman . "Secure Use of VLANs: An @stake Security Assessment." @Stake. August, 2002. http://www.cisco.com/application/pdf/en/us/guest/products/ps708/c1697/ccmigration_09186a008012ed31.pdf.

11 Cisco Systems, Inc. "Configuring VLANs." June 1, 2001. http://www.cisco.com/univercd/cc/_td/doc/product/lan/cat4000/rel6_2/config/vlans.htm. December 2001.

12 Cisco Systems, Inc. "Securing Networks with Private VLANs and VLAN Access Control Lists." http://www.cisco.com/warp/public/473/90.shtml. December 2001.



    Inside Network Perimeter Security
    Inside Network Perimeter Security (2nd Edition)
    ISBN: 0672327376
    EAN: 2147483647
    Year: 2005
    Pages: 230

    Similar book on Amazon

    flylib.com © 2008-2017.
    If you may any questions please contact us: flylib@qtcs.net