© Digital_Art/Shutterstock

References

Beaver, Kevin. Hacking for Dummies. 3rd ed. Indianapolis: Wiley Publishing, Inc., 2010.

Bhaiji, Yusuf. Network Security Technologies and Solutions. Indianapolis: Cisco Press, 2008.

Bott, Ed. “The malware numbers game: How many viruses are out there?” The Ed Bott Report, April 15, 2012. http://www.zdnet.com/blog/bott/the-malware-numbers-game-how-many-viruses-are-out-there/4783 (accessed May 2, 2013).

Brenner, Laurie. “How to tell a firewall breach.” It Still Works. https://itstillworks.com/tell-firewall-breach-12210516.html (accessed February 16, 2020).

Brewster, Thomas. “How hackers abused Tor to rob Blockchain, steal Bitcoin, target private email and get away with it.” Forbes, February 24, 2015. https://www.forbes.com/sites/thomasbrewster/2015/02/24/blockchain-and-darknet-hacks-lead-to-epic-bitcoin-losses/#747eec2335e5 (accessed March 22, 2020).

Cheswick, William R., Steven M. Bellovin, and Aviel D. Rubin. Firewalls and Internet Security: Repelling the Wily Hacker. 2nd ed. Boston: Addison-Wesley Professional, 2003.

Cisco Systems. “IKEv2 Packet Exchange and Protocol Level Debugging,” 2013. http://www.cisco.com/en/US/tech/tk583/tk372/technologies_tech_note09186a0080bf2932.shtml (accessed June 17, 2013).

Cisco Systems. Internetworking Technologies Handbook, Virtual Private Networks. http://www.cisco.com/en/US/docs/internetworking/technology/handbook/VPN.html (accessed July 15, 2010).

Cole, Eric. Hiding in Plain Sight: Steganography and the Art of Covert Communication. Indianapolis: Wiley Publishing, Inc., 2003.

_______. Network Security Bible. Indianapolis: Wiley Publishing, Inc., 2009.

Comer, Douglas E. Internetworking with TCP/IP, Vol 1. 5th ed. Upper Saddle River, NJ: Prentice Hall, 2005.

Davies, Joseph, and Elliot Lewis. Deploying Virtual Private Networks with Microsoft Windows Server 2003 (Technical Reference). Redmond, WA: Microsoft Press, 2003.

Davis, Michael, Sean Bodmer, and Aaron LeMasters. Hacking Exposed Malware and Rootkits. New York: McGraw-Hill Osborne Media, 2009.

Defense Information Systems Agency (DISA). “Information Assurance Support Environment (IASE), Security Checklists.” http://iase.disa.mil/stigs/checklist/index.html (accessed July 15, 2010).

Defense Information Systems Agency (DISA). “Information Assurance Support Environment (IASE), Security Technical Implementation Guides (STIGS).” http://iase.disa.mil/stigs/stig/index.html (accessed July 15, 2010).

DeLaet, Gert, and Gert Schauwers. Network Security Fundamentals. Indianapolis: Cisco Press, 2004.

Douligeris, Christos, and Dimitrios N. Serpanos. Network Security: Current Status and Future Directions. Hoboken, NJ: Wiley-IEEE Press, 2007.

Dr. K. Hackers’ Handbook 3.0 (Expanded, Revised and Updated): Includes WiFi, Identity Theft, Information Warfare and Web 2.0. New York: Carlton Books, 2009.

Erickson, Jon. Hacking: The Art of Exploitation. 2nd ed. San Francisco: No Starch Press, 2008.

Feilner, Markus. OpenVPN: Building and Integrating Virtual Private Networks. Birmingham, England: Packt Publishing, 2006.

Ford, Jerry Lee Jr. Absolute Beginner’s Guide to Personal Firewalls. Indianapolis: Que, 2007.

Frenkel, Sheila, et al. “Guide to Ipsec VPNs: Recommendations of the National Institute of Standards and Technology.” Special publication 800-77. Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology, 2005.

Gerwitz, David. “How the President’s secret helicopter plans wound up in Iran.” CNN. March 2009. http://ac360.blogs.cnn.com/2009/03/10/how-the-presidents-secret-helicopter-plans-wound-up-iran/ (accessed July 15, 2010).

Harris, Shon. CISSP All-in-One Exam Guide. 5th ed. New York: McGraw-Hill Osborne Media, 2010.

_______, Allen Harper, Chris Eagle, and Jonathan Ness. Gray Hat Hacking, Second Edition: The Ethical Hacker’s Handbook. New York: McGraw-Hill Osborne Media, 2007.

Huang, Qiang, and Jazib Frahim. SSL Remote Access VPNs. Indianapolis: Cisco Press, 2008.

IETF RFC Repository. http://www.ietf.org/rfc.html (accessed July 15, 2010).

Internet Engineering Task Force (IETF). “Internet Key Exchange (IKEv2) Protocol.” December 2005. http://tools.ietf.org/html/rfc4306 (accessed July 15, 2010).

InfoSecurity. “Advanced malware detection—Signatures vs. behavior analysis.” April 11, 2017. https://www.infosecurity-magazine.com/opinions/malware-detection-signatures/ (accessed June 10, 2020).

Internet Society. “State of IPv6 deployment 2018.” June 6, 2018. https://www.internetsociety.org/resources/2018/state-of-ipv6-deployment-2018/ (accessed July 27, 2019).

ipv6-test.com. Monthly statistics. https://ipv6-test.com/stats/ (accessed August 5, 2019).

Irwin, Mike, Charlie Scott, and Paul Wolfe. Virtual Private Networks. 2nd ed. Sebastopol, CA: O’Reilly Media, 1998.

Katz, Jonathan, and Yehuda Lindell. Introduction to Modern Cryptography: Principles and Protocols. Chapman & Hall/CRC, 2007.

Komar, Brian, Ronald Beekelaar, and Joern Wettern. Firewalls for Dummies. 2nd ed. Indianapolis: Wiley Publishing, Inc., 2003.

Kozierok, Charles. The TCP/IP Guide: A Comprehensive, Illustrated Internet Protocols Reference. San Francisco: No Starch Press, 2005.

Krawetz, Neal. Introduction to Network Security. Boston, MA: Charles River Media, 2006.

Lewis, Mark. Comparing, Designing, and Deploying VPNs. Indianapolis: Cisco Press, 2006.

Linux Home Networking. “Configuring Linux VPNs.” http://www.linuxhomenetworking.com/wiki/index.php/Quick_HOWTO_:_Ch35_:_Configuring_Linux_VPNs (accessed July 15, 2010).

Liu, Dale, Stephanie Miller, Mark Lucas, Abhishek Singh, and Jennifer Davis. Firewall Policies and VPN Configurations. Rockland, MA: Syngress, 2006.

Long, Johnny, Jack Wiles, Scott Pinzon, and Kevin D. Mitnick. No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing. Rockland, MA: Syngress, 2008.

Lyon, Gordon Fyodor. Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning. Sunnyvale, CA: Nmap Project, 2009.

Mairs, John. VPNs: A Beginner’s Guide. New York: McGraw-Hill Osborne Media, 2001.

Maiwald, Eric. Network Security: A Beginner’s Guide. 2nd ed. New York: McGraw-Hill Osborne Media, 2003.

McClure, Stuart, Joel Scambray, and George Kurtz. Hacking Exposed: Network Security Secrets and Solutions. 6th ed. New York: McGraw-Hill Osborne Media, 2009.

Merkow, Mark S. Virtual Private Networks for Dummies. Indianapolis: Wiley Publishing, Inc., 1999.

Microsoft Docs. “About Remote Desktop Services.” May 31, 2018. https://docs.microsoft.com/en-us/windows/win32/termserv/about-terminal-services (accessed March 15, 2020).

Microsoft Technet. “DirectAccess Technical Overview.” http://technet.microsoft.com/library/dd637827.aspx (accessed July 15, 2010).

Mitnick, Kevin D., William L. Simon, and Steve Wozniak. The Art of Deception: Controlling the Human Element of Security. Indianapolis: Wiley Publishing, Inc., 2003.

_______, and William L. Simon. The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers. Indianapolis: Wiley Publishing, Inc., 2005.

MITRE Corporation. “MITRE’s Common Vulnerability Database (CVE).” http://cve.mitre.org/ (accessed July 15, 2010).

National Institute of Standards and Technology (NIST), National Vulnerability Database. http://nvd.nist.gov/ (accessed July 15, 2010).

Nichols, Randall K., and Panos C. Lekkas. Wireless Security: Models, Threats, and Solutions. New York: McGraw-Hill Osborne Media, 2001. http://www.jacco2.dds.nl/networking/certutil.html (accessed June 21, 2010).

OpenVPN. “2x HOW TO.” https://openvpn.net/community-resources/how-to/ (accessed March 16, 2020).

Peltier, Thomas R. Information Security Risk Analysis. 3rd ed. Auerbach Publications, 2010.

Philipp, Aaron, David Cowen, and Chris Davis. Hacking Exposed Computer Forensics. 2nd ed. New York: McGraw-Hill Osborne Media, 2009.

PopTop + MSCHAPv2 + Samba + Radius + Microsoft Active Directory + Fedora Howto. http://www.members.optushome.com.au/~wskwok/poptop_ads_howto_1.htm (accessed July 15, 2010).

PrivateTunnel.com. “OpenVPN.” https://www.privatetunnel.com/ (accessed March 15, 2020).

Real Time Enterprises, Incorporated. “Create a IPSEC + Certificates MMC.” http://support.real-time.com/open-source/ipsec/index.html (accessed July 15, 2010).

Rhodes-Ousley, Mark, Roberta Bragg, and Keith Strassberg. Network Security: The Complete Reference. New York: McGraw-Hill Osborne Media, 2003.

Ruston, Chris, and Chris Peiris. How to Cheat at Designing Security for a Windows Server 2003 Network. Rockland, MA: Syngress, 2006.

SANS. “The Top Cyber Security Risks.” http://www.sans.org/top-cyber-security-risks/?ref=top20 (accessed July 15, 2010).

Scarfone, Karn, and Paul Hoffman. Guidelines on Firewalls and Firewall Policy: Special Publication 800-41, Revision 1. Washington: National Institute of Standards and Technology (NIST), 2009.

Schneier, Bruce. Schneier’s Cryptography Classics Library: Applied Cryptography, Secrets and Lies, and Practical Cryptography. Indianapolis: Wiley Publishing, Inc., 2007.

_______. Secrets and Lies: Digital Security in a Networked World. Indianapolis: Wiley Publishing, Inc., 2004.

Schudel, Gregg, and David J. Smith. Router Security Strategies: Securing IP Network Traffic Planes. Indianapolis: Cisco Press, 2008.

SearchNetworking.com. “Authentication, authorization, and accounting (AAA)” (n.d.) http://searchsecurity.techtarget.com/definition/authentication-authorization-and-accounting (accessed June 17, 2013).

_______. “Network packet” (n.d.) http://searchnetworking.techtarget.com/definition/packet (accessed June 17, 2013)

_______. “Port Address Translation (PAT)” (n.d.). http://searchnetworking.techtarget.com/definition/Port-Address-Translation-PAT (accessed June 17, 2013).

Security Focus. “Embassy leaks highlight pitfalls of Tor.” September, 2007. http://www.securityfocus.com/news/11486 (accessed July 15, 2010).

Shinder, Thomas W. The Best Damn Firewall Book Period. 2nd ed. Rockland, MA: Syngress, 2008.

SmoothWall Community Forums. http://community.smoothwall.org/forum/ (accessed July 15, 2010).

SmoothWall Limited. http://www.smoothwall.net/ (accessed July 15, 2010).

SmoothWall Open Source Project. http://www.smoothwall.org/ (accessed July 15, 2010).

Snader, Jon C. VPNs Illustrated: Tunnels, VPNs, and IPsec. Boston: Addison-Wesley Professional, 2005.

Stevens, W. Richard, and Gary R. Wright. TCP/IP Illustrated, Volumes 1–3. Boston: Addison-Wesley Professional, 1994.

Stewart, James Michael. CompTIA Security+ Review Guide: SY0-201. Indianapolis: Sybex, 2008.

_______, Ed Tittel, and Mike Chapple. CISSP: Certified Information Systems Security Professional Study Guide. 4th ed. Indianapolis: Sybex, 2008.

Strassberg, Keith, Gary Rollie, and Richard Gondek. Firewalls: The Complete Reference. New York: McGraw-Hill Osborne Media, 2002.

Sweeney, T. “Businesses lock in on VPN outsourcing options providers of virtual private network services put a new spin on the outsourcing spiel.” InformationWeek, April 3, 2000. http://www.informationweek.com/780/vpn.htm (accessed July 15, 2010).

Volonino, Linda, and Ian Redpath. e-Discovery for Dummies. Indianapolis: Wiley Publishing, Inc, 2009.

Vyncke, Eric, and Christopher Paggen. LAN Switch Security: What Hackers Know About Your Switches. Indianapolis: Cisco Press, 2007.

Whitman, Michael E., Herbert J. Mattord, Richard Austin, and Greg Holden. Guide to Firewalls and Network Security. Florence, KY: Course Technology/Cengage Learning Inc., 2008.

Whittacker, Zack. “NordVPN confirms it was hacked.” Verizon Media, October 21, 2019. https://techcrunch.com/2019/10/21/nordvpn-confirms-it-was-hacked/ (accessed March 3, 2019).

Yuan, Ruixi, and W. Timothy Strayer. Virtual Private Networks: Technologies and Solutions. Boston: Addison-Wesley Professional, 2001.

Zwicky, Elizabeth D., Simon Cooper, and D. Brent Chapman. Building Internet Firewalls. 2nd ed. Sebastopol, CA: O’Reilly Media, 2000.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.21.98.207