Home > Articles


  • Print
  • + Share This
This chapter is from the book

Need to Know More?

The Internet Storm Center: http://isc.incidents.org.

Denial of Service Attacks: http://www.cert.org/tech_tips/denial_of_service.html.

Unauthorized P2P Use Risky for Businesses: http://www.idg.net/ic_1326812_9677_1-5044.html.

Allen, Julia H. The CERT Guide to System and Network Security Practices. Boston: Addison-Wesley, 2001.

Hines, Annlee A. Planning for Survivable Networks. Indianapolis, Indiana: Wiley Publishing, Inc. 2002.

McCarthy, Mary Pat and Stuart Campbell. Security Transformation: Digital Defense Strategies to Protect Your Company's Reputation & Market Share. New York: McGraw-Hill, 2001.

Mitnick, Kevin. The Art of Deception: Controlling the Human Element of Security. Indianapolis, Indiana: Wiley Publishing, Inc. 2002.

Power, Richard. Tangled Web: Tales of Digital Crime from the Shadows of Cyberspace. Indianapolis, Indiana: Que, 2000.

  • + Share This
  • 🔖 Save To Your Account