Appendix A. References

This appendix lists books, websites, and other resources that are referred to throughout this book, along with resources that were used during the research process.


Note

The website references in this book were accurate upon publication; however, they might have since changed. If the website is unavailable, you might want to conduct a search using a powerful search engine such as Google (http://www.google.com) and entering the document title as key words.


Berinato, S. with research by Cosgrove, L. "The State of Information Security 2003 Survey.” CSO Magazine. Study conducted by PricewaterhouseCoopers and CIO Magazine. http://www.csoonline.com/read/100103/survey.html. October 2003.

Bosworth, S. and Kabay, M. Computer Security Handbook, 4th Edition. Wiley Publishing. 2002.

Briney, A. and Prince, F. "Security Survey: Disciplined Security.” Information Security. http://infosecuritymag.techtarget.com/ss/0,295796,sid6_iss143_art294,00.html. October 2003.

Cisco Connection Online. http://www.cisco.com.

Cisco SAFE Blueprint white papers. http://www.cisco.com/en/US/netsol/ns340/ns394/ns171/ns128/networking_solutions_package.html.

"CSI/FBI Computer Crime and Security Survey 2003.” Computer Security Institute and Federal Bureau of Investigation (CSI/FBI). http://www.gocsi.com/forms/fbi/pdf.jhtml.

"CSI/FBI Computer Crime and Security Survey 2004.” Computer Security Institute and Federal Bureau of Investigation (CSI/FBI). http://i.cmpnet.com/gocsi/db_area/pdfs/fbi/FBI2004.pdf.

Department of Homeland Security. http://www.dhs.gov/dhspublic/.

Doraswamy, N. and Harkins, D. IPSec: The New Security Standard for the Internet, Intranets, and Virtual Private Networks. Prentice Hall PTR. 1999.

Fratto, M. "Don’t Panic. Plan.” Network Computing website. http://www.networkcomputing.com/1408/1408f1.html. May 1, 2003.

Hulme, G.V. "No Time to Relax.” Information Week. http://www.informationweek.com/story/showArticle.jhtml?articleID=12803057. July 28, 2003.

"Information Security Breaches Survey 2002, Technical Report.” Pricewaterhouse Coopers UK, Department of Trade and Industry UK. http://www.dti.gov.uk/industry_files/pdf/sbsreport_2002.pdf. April 2002.

"Information Security Breaches Survey 2004, Executive Summary.” Pricewaterhouse Coopers UK, Department of Trade and Industry UK. http://www.pwc.com/images/gx/eng/about/svcs/grms/2004Exec_Summ.pdf. April 2004.

"Information Security Breaches Survey 2004, Technical Report.” Pricewaterhouse Coopers UK, Department of Trade and Industry UK. http://www.pwc.com/images/gx/eng/about/svcs/grms/2004Technical_Report.pdf. April 2004.

Internet Requests for Comments (RFCs). http://www.cse.ohio-state.edu/cs/Services/rfc/.

Kirkpatrick, David. NEXT@CNN. CNN. January 11, 2004.

McClure, S., Scambray, J., and Kurtz, G. Hacking Exposed: Network Security Secrets & Solutions, 4th edition. McGraw-Hill Ryerson. 2003.

Newton, H. Newton’s Telecom Dictionary: The Official Dictionary of Telecommunications Networking and Internet, 16th Edition. Pub Group West. March 2000.

Norton website. http://www.norton.com.

Paquet, C. and Teare, D. CCNP Self-Study: Building Scalable Cisco Internetworks (BSCI), 2nd Edition. Cisco Press. 2004.

Snyder, J. "Taking Aim.” Information Security. January 2004.

Symantec Corporation Norton website. http://www.norton.com.

Websense website. http://www.websense.com.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.189.188.36