Resources
Created: Feb. 5, 2004
Books
- Bishop, Matt. Computer Security: Art and Science. (Chapter 28).
Addison Wesley, 2002.
- Pfleeger, Charles P. Security in Computing, 2nd Edition.
(Chapter 10). Prentice Hall. 1997.
- Smith, Ben and Wit, Brian K. Microsoft
Windows Security Resource Kit. Microsoft Press. 2003.
Articles
- Bashir, Imran, Enrico Serafini, and Kevin Wall, "Securing network software
applications: introduction", Communications of the ACM, Volume 44 Issue
2, February 2001.
- Boran, Seán. An Overview of Corporate
Information Security. 2002. Available at http://secinf.net/policy_and_standards/An_Overview_of_Corporate_Information_Security_.html.
- Danchev, Dancho. Building and
Implementing a Successful Information Security Policy. 2003. Available
at http://secinf.net/policy_and_standards/Building_Implementing_Security_Policy1228.html.
- Network Security Team, MIS Corporate Defence Solutions Ltd. An Overview of Network Security Analysis and
Penetration Testing. 2000. Available at http://www.secinf.net/auditing/An_Overview_of_Network_Security_Analysis_and_Penetration_Testing.html.
- Sanctum, Inc. Ethical Hacking Techniques
to Audit and Secure Web-enabled Applications. 2002. Available at http://www.secinf.net/auditing/Ethical_Hacking_Techniques_to_Audit_and_Secure_Webenabled_Applications.html.
- SANS Institute. Acceptable Encryption
Policy. 2003. Available at http://secinf.net/policy_and_standards/Acceptable_Encryption_Policy.html.
- SANS Institute. Acceptable Use
Policy. 2003. Available at http://secinf.net/policy_and_standards/Acceptable_Use_Policy.html.
- Shimonski, Robert J. Windows 2000 DMZ
Design. Available at http://www.secinf.net/windows_security/Windows_2000_DMZ_Design1280.html.
- Singapore IT Security Techno Portal. How
to develop a Network Security Policy. 2002. Available at http://secinf.net/policy_and_standards/How_to_develop_a_Network_Security_Policy_.html.
Web Sites