< Day Day Up > |
Books and ArticlesCaswell, Brian, Jay Beale, James C. Foster, and Jeffrey Posluns. 2003. Snort 2.0 Intrusion Detection. Rockland, MA: Syngress. Cisco Internetwork Basics: www.idevelopment.info/data/Networking/Networking_Basics/BASICS_Understanding_OSI_Model.shtml Drummond, Richard. 1993. Data Communications for the Office. New York: Bantam Professional Books. EMACS quick reference: http://seamons.com/emacs/ Hafner, Katie and John Markoff. 1991. Cyberpunk: Outlaws and Hackers on the Computer Frontier. New York: Simon and Schuster. Introduction to Cryptography, Network Associates: www.pgpi.org/doc/pgpintro/ Krutz, Ronald L. and Russell Dean Vines. 2001. The CISSP Prep Guide. New York: John Wiley & Sons. Lammle, Todd. 2003. CCNA Cisco Certified Network Associate Study Guide, Fourth Edition. Location: San Francisco: Sybex. Levy, Steven. 2002. Crypto: How the Code Rebels Beat the Government Saving Privacy in the Digital Age. New York: Penguin Putnam Inc. Marcus, J. Scott. 1999. Designing Wide Area Networks and Internetworks: A Practical Guide. Boston: Addison-Wesley. The OSI Model: www.wdsd.org/strut/OSI/osimodel.html Scambray, Joel, Stuart McClure, and George Kurtz. 2001. Hacking Exposed, Second Edition. New York: McGraw Hill. Schneier, Bruce. 1995. Applied Cryptography: Protocols, Algorithms, and Source Code in C, Second Edition. Hoboken, NJ: John Wiley & Sons. Schultz, E. Eugene. 2000. Windows NT/2000 Network Security. New York: MacMillan Technical Publishing. Singh, Simon. 2000. The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography. London: Anchor Books. Smith, Richard E. 2001. Authentication: From Passwords to Public Keys. Boston: Addison-Wesley. Stanger, James, Patrick T. Lane, and Edgar Danielyan. 2001. Hackproofing Linux. Rockland, MA: Syngress. Torvalds, Linus and David Diamond. 2002. Just for Fun: The Story of an Accidental Revolutionary. New York: HarperBusiness. |
< Day Day Up > |