[1] The United States Computer Emergency Readiness Team, at http://www.us-cert.gov.

[2] J. Mirkovic and P. Reiher, “A Taxonomy of DDoS Attack and DDoS Defense Mechanisms,” ACM Computer Communications Review 34, No. 2 (April 2004), pp. 39–53.

[3] D. Moore, C. Shannon, and K. Claffy, “Code Red: A Case Study on the Spread and Victims of an Internet Worm,” Proceedings of the 2nd ACM SIGCOMM Workshop on Internet Measurement (IMW), Marseille, France, 2002, pp. 273–284.

[4] Z. Chen, L. Gao, and K. Kwiat, “Modeling the Spread of Active Worms,” Proceedings of IEEE Infocom, San Franciso, CA, April 2003.

[5] Richard Bejtlich, The Tao of Network Security Monitoring (Boston: Addison-Wesley, 2004).

[6] W. Stallings, Network Security Essentials, 2nd ed. (Englewood Cliffs, NJ: Prentice Hall, 2003).

[7] S. Z. Northcutt, L. Winters, S. Frederick, and K. K. Ritchey, Inside Network Perimeter Security (Indianapolis: New Riders, 2005).

[8] W. R. Cheswick, S. M. Bellovin, and A. D. Rubin, Firewalls and Internet Security (Boston: Addison-Wesley, 2003).

[9] D. Stinson, Cryptography: Theory and Practice, 3rd ed. (Boca Raton, FL: Chapman & Hall/CRC Press, 2006).

[10] C. Kaufmann, R. Perlman, and M. Speciner, Network Security: Private Communication in a Public World (Englewood Cliffs, NJ: Prentice Hall PTR, 2002).

[11] J. Edney and W. A. Arbaugh, Real 802.11 Security: Wi-Fi Protected Access and 802.11i (Englewood Cliffs, NJ: Prentice Hall, 2004).

[12] S. Northcutt and J. Novak, Network Intrusion Detection: An Analyst’s Handbook (Indianapolis: New Riders, 2001).

[13] E. G. Amoroso, Intrusion Detection: An Introduction to Internet Surveillance, Correlation, Trace Back, Traps, and Response (.Sparta, N.J.:Intrusion.net Books, 1999).

[14] A. Whitaker and D. Newman, Penetration Testing and Network Defense (Indianapolis, IN: Cisco Press, 2005).

[15] C. McNab, Network Security Assessment: Know Your Network (Sebastopol, CA: O’Reilly Books, 2004).

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset