Previous Section  < Day Day Up >   

Books and Articles

Caswell, Brian, Jay Beale, James C. Foster, and Jeffrey Posluns. 2003. Snort 2.0 Intrusion Detection. Rockland, MA: Syngress.

Cisco Internetwork Basics:

Drummond, Richard. 1993. Data Communications for the Office. New York: Bantam Professional Books.

EMACS quick reference:

Hafner, Katie and John Markoff. 1991. Cyberpunk: Outlaws and Hackers on the Computer Frontier. New York: Simon and Schuster.

Introduction to Cryptography, Network Associates:

Krutz, Ronald L. and Russell Dean Vines. 2001. The CISSP Prep Guide. New York: John Wiley & Sons.

Lammle, Todd. 2003. CCNA Cisco Certified Network Associate Study Guide, Fourth Edition. Location: San Francisco: Sybex.

Levy, Steven. 2002. Crypto: How the Code Rebels Beat the Government Saving Privacy in the Digital Age. New York: Penguin Putnam Inc.

Marcus, J. Scott. 1999. Designing Wide Area Networks and Internetworks: A Practical Guide. Boston: Addison-Wesley.

The OSI Model:

Scambray, Joel, Stuart McClure, and George Kurtz. 2001. Hacking Exposed, Second Edition. New York: McGraw Hill.

Schneier, Bruce. 1995. Applied Cryptography: Protocols, Algorithms, and Source Code in C, Second Edition. Hoboken, NJ: John Wiley & Sons.

Schultz, E. Eugene. 2000. Windows NT/2000 Network Security. New York: MacMillan Technical Publishing.

Singh, Simon. 2000. The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography. London: Anchor Books.

Smith, Richard E. 2001. Authentication: From Passwords to Public Keys. Boston: Addison-Wesley.

Stanger, James, Patrick T. Lane, and Edgar Danielyan. 2001. Hackproofing Linux. Rockland, MA: Syngress.

Torvalds, Linus and David Diamond. 2002. Just for Fun: The Story of an Accidental Revolutionary. New York: HarperBusiness.

    Previous Section  < Day Day Up >