Home > Articles

  • Print
  • + Share This
This chapter is from the book

This chapter is from the book

Need to Know More?

For further information on device and media security, and security topology, consult the following books:

Hausman, Kirk, Diane Barrett, and Martin Weiss. Security+ Exam Cram 2. Indianapolis, IN: Que Publishing, 2003. Chapter 6, "Infrastructure Security."

King, Todd and David Bittlingmeier. Security+ Training Guide. Indianapolis, IN: Que Publishing, 2003. Chapter 3, "Devices, Media, and Topology Security."

Taylor, Tiffany, ed. Security Complete. Alameda, CA: Sybex, Inc., 2002.

For further information on VPNs and their implementation (as well as additional information on general network security), see the following:

Northcutt, Stephen, Lenny Zeltser, Scott Winters, Karen Frederick, and Ronald W. Ritchey. Inside Network Perimeter Security: The Definitive Guide to Firewalls, VPNs, Routers, and Intrusion Detection Systems. Indianapolis, IN: New Riders, Inc., 2003.

For further information on network troubleshooting tools, check out this book:

Sloan, Joseph D. Network Troubleshooting Tools. Sebastopol, CA: O'Reilly & Associates, Inc., 2001.

For further information on network monitoring and analysis, see the following:

Wilson, Ed. Network Monitoring and Analysis: A Practical Approach to Troubleshooting. Indianapolis, IN: Prentice Hall PTR, 2000.

For further information on bastion hosts, consult the following:

Norberg, Stefan. Securing Windows NT/2000 Servers on the Internet. Sebastopol, CA: O'Reilly. 2000.

For further information on VLANs, see this book:

Seifert, Rich. The Switch Book: The Complete Guide to LAN Switching Technology. New York, NY: John Wiley & Sons, Inc., 2000.

For further information on intrusion detection and response, see the following books:

Hausman, Kirk, Diane Barrett, and Martin Weiss. Security+ Exam Cram 2. Indianapolis, IN: Que Publishing, 2003. Chapter 7, "Intrusion Detection and Security Baselines."

King, Todd and David Bittlingmeier. Security+ Training Guide. Indianapolis, IN: Que Publishing, 2003. Chapter 4, "Intrusion Detection, Baselines, and Hardening."

Pipkin, Donald. Information Security: Protecting the Global Enterprise, First Edition. Upper Saddle River, NJ: Prentice Hall, 2002.

Shinder, Debra. Scene of the Cybercrime: Computer Forensics Handbook. Rockland, MA: Syngress. Chapter 9, "Implementing Cybercrime Detection Techniques," and Chapter 10, "Collecting and Preserving Digital Evidence."

For further information on security baselines and system hardening, consult the following resources:

Hausman, Kirk, Diane Barrett, and Martin Weiss. Security+ Exam Cram 2. Indianapolis, IN: Que Publishing, 2003. Chapter 7, "Intrusion Detection and Security Baselines."

King, Todd and David Bittlingmeier. Security+ Training Guide. Indianapolis, IN: Que Publishing, 2003. Chapter 4, "Intrusion Detection, Baselines, and Hardening."

Chapter 8, Security Baselines, http://www.docendo.se/mspress/msp_online/samplechapter/0735618224.htm.

For further information on MBSA and SCA, see the following:

Smith, Ben and Brian Komar. Microsoft Windows Security Resource Kit. Redmond, WA: Microsoft Press, 2003. Chapter 24, "Using Security Assessment Tools."

For further information on system and network hardening, see the following:

Bragg, Roberta. Hardening Windows Systems. Emeryville, CA: McGraw Hill/Osborne, 2004.

For further information on application server hardening, check out the following resources:

Smith, Ben and Brian Komar. Microsoft Windows Security Resource Kit. Redmond, WA: Microsoft Press, 2003. Part IV: "Securing Common Services."

Chapter 8, Security Baselines, http://www.docendo.se/mspress/msp_online/samplechapter/0735618224.htm.

For further information on Linux security, see the following:

Toxen, Bob. Real World Linux Security, 2nd Edition. Upper Saddle River, NJ: Prentice Hall PTR, 2002.

For further information on Unix security, see the following:

Spafford, Gene, Simson Garfinkel, and Alan Schwartz. Practical Unix and Internet Security, 3rd Edition. Sebastopol, CA: O'Reilly & Associates, Inc., 2003.

  • + Share This
  • 🔖 Save To Your Account