8.9 Endnotes


8.9 Endnotes

1. Lowery, J. Craig. "Developing Effective Security Policies," Dell Power Solutions, November 2002 , Dell Computer.

2. See http://www.sans.org .

3. Guel, Michele. "Proven Practices for Managing the Security Function," from the SANS certification program for Certified Information Security Officers.

4. Fraser, B., ed. RFC 2196, "Site Security Handbook," September 1997 . IETF NWG, at http://www.ietf.org .

5. Fites, M., P. Kratz, and A. Brebner. Control and Security of Computer Information Systems . Computer Science Press, 1989 .

6. Pfleeger, C., Security in Computing . Englewood Cliffs, NJ: Prentice Hall, 1989 .

7. White House Press release issued February 14, 2003 , at http://usinfo.state.gov/topical/pol/terror/03021600.htm .

8. See http://www.it-isac.org .

9. "SoBig.F breaks virus speed records," CNN News, Friday, August 22, 2003 . Posted: 0625 GMT (2:25 PM HKT), http://edition.cnn.com/2003/TECH/internet/08/21/sobig.virus .

10. The SANS Reading Room URL is http://www.sans.org/rr .

11. Karygiannis, Tom, and Les Owens, ed. NIST Special Publication 800-48 (Draft), "Wireless Network Security 802.11, Bluetooth and Handheld Devices. Washington, DC: U.S. Department of Commerce, July 2003 .

12. See note 11.




Wireless Operational Security
Wireless Operational Security
ISBN: 1555583172
EAN: 2147483647
Year: 2004
Pages: 153

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net