1. Lowery, J. Craig. "Developing Effective Security Policies," Dell Power Solutions, November 2002 , Dell Computer.
2. See http://www.sans.org .
3. Guel, Michele. "Proven Practices for Managing the Security Function," from the SANS certification program for Certified Information Security Officers.
4. Fraser, B., ed. RFC 2196, "Site Security Handbook," September 1997 . IETF NWG, at http://www.ietf.org .
5. Fites, M., P. Kratz, and A. Brebner. Control and Security of Computer Information Systems . Computer Science Press, 1989 .
6. Pfleeger, C., Security in Computing . Englewood Cliffs, NJ: Prentice Hall, 1989 .
7. White House Press release issued February 14, 2003 , at http://usinfo.state.gov/topical/pol/terror/03021600.htm .
8. See http://www.it-isac.org .
9. "SoBig.F breaks virus speed records," CNN News, Friday, August 22, 2003 . Posted: 0625 GMT (2:25 PM HKT), http://edition.cnn.com/2003/TECH/internet/08/21/sobig.virus .
10. The SANS Reading Room URL is http://www.sans.org/rr .
11. Karygiannis, Tom, and Les Owens, ed. NIST Special Publication 800-48 (Draft), "Wireless Network Security 802.11, Bluetooth and Handheld Devices. Washington, DC: U.S. Department of Commerce, July 2003 .
12. See note 11.