Home > Articles > Certification > Cisco Certification

  • Print
  • + Share This
This chapter is from the book


For additional information, refer to these resources.


Harris, S. CISSP All-in-One Exam Guide, Fifth Edition (McGraw-Hill Professional, 2010).

McClure, S., Scambray, J., and Kurtz, G. Hacking Exposed, Sixth Edition (McGraw-Hill Professional, 2009).

McClure, S., Scambray, J., and Kurtz, G. Hacking Exposed, Seventh Edition (McGraw-Hill Professional, 2012).

NIST SP 800-27 Rev A, Engineering Principles for Information Technology Security.

NIST SP 800-42, Guidelines on Network Security Testing.

NIST SP 800-64 Rev. A, Security Considerations in the Information System Development Life Cycle.

Richardson, R. 2010-2011 CSI Computer Crime and Security Survey (http://gocsi.com/survey).

Wood, C. Information Security Policies Made Easy, Version 11 (Information Shield, 2009).

Web Resources

Insecure.org, http://www.insecure.org/nmap/

SecurityFocus, http://www.securityfocus.com/

Security-Solutions.net, http://www.security-solutions.net/download/index.html

The GNU Netcat Project (G. Giacobbi), http://netcat.sourceforge.net/

The Jargon File, http://www.catb.org/~esr/jargon/html/index.html

  • + Share This
  • 🔖 Save To Your Account