APPENDIX B
RESOURCES

Figure B.1
A sample contract from the Independent Computer Consultants Association (ICCA)

Image
Image
Image
Image

Courtesy Course Technology/Cengage Learning

BOOKS

Chapter 1

Ruhl, Janet. The Computer Consultants Guide. Wiley, 1997. ISBN 0471176494.

Meyer, Peter. Getting Started in Computer Security. Wiley, 1999. ISBN 0471348139.

Chapter 8

Palmer, Michael. Guide to Operating Systems, Enhanced Edition. Course Technology, Cengage Learning, 2007. ISBN 1418837199.

Chapter 12

Kahn, David. The Code Breakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet, Revised Edition. Scribner, 1996. ISBN 0684831309.

Schneier, Bruce. Applied Crytopgraphy: Protocols, Algorithms, and Source Code in C, Second Edition. Wiley, 1996. ISBN 0471117099.

Chapter 13

Cannon, Kelly, Kelly Caudle, and Anthony V. Chiarella. CCNA Guide to Cisco Networking Fundamentals, Fourth Edition. Course Technology, Cengage Learning, 2009. ISBN 1418837059.

WEB SITES

Chapter 1

Professional Certifications, Security Jobs, and Applicable Laws

www.comptia.org

www.eccouncil.org

www.giac.org

www.isc2.org

www.isecom.org

http://jobsearch.monster.com

www.ncsl.org/programs/lis/CIP/hacklaw.htm

www.sans.org

Chapter 2

Protocols

www.cisco.com/security_services/ciag/documents/v6-v4-threats.pdf

www.iana.org

www.ietf.org

Chapter 3

Identifying Malware

www.spywareguide.com

Searching for Known Vulnerabilities and Exposures

http://archives.neohapsis.com

www.cve.mitre.org

www.kb.cert.org/vuls

www.lysator.liu.se/mit-guide/MITLockGuide.pdf

www.microsoft.com/security/bulletins/default.mspx

www.neworder.box.sk

www.osvdb.org

www.packetstormsecurity.com

www.securityfocus.com

www.symantec.com

www.us-cert.gov

Chapter 4

Footprinting

www.arin.net

http://gnu.org/software/wget/wget.html

http://groups.google.com

www.informatica64.com/FOCA

www.knowprivacy.org

http://members.shaw.ca/nicholas.fong/dig

www.namedroppers.com

www.nscan.org

www.parosproxy.org

www.paterva.com/web4/index.php/maltego

www.rafasoft.com

www.samspade.org

www.securityfocus.com/tools/139

www.severus.org/sacha/metis

www.whitepages.com

www.whois.net

Chapter 5

Port Scanning

www.atelierweb.com

www.cve.mitre.org

www.fping.com

www.hping.org

www.nessus.org

www.unicornscan.org

www.us-cert.gov

Chapter 6

Enumeration

www.l0phtcrack.com/download.html

www.nessus.org

www.novell.com

www.systemtools.com

Chapter 7

Programming

http://activestate.com/activeperl

http://history.perl.org/PerlTimeline.html

www.metasploit.com

www.plenz.com/reverseshell

www.w3c.org

Chapter 8

Desktop and Server OSs

www.cisecurity.org/benchmarks.html

www.cve.mitre.org

www.iana.org/assignments/port-numbers

www.ionx.co.uk

www.microsoft.com/technet/security/Bulletin/MS09-044.mspx

www.microsoft.com/technet/security/tools/mbsahome.mspx

www.microsoft.com/technet/security/tools

www.nsa.gov/research/selinux

www.ntsecurity.nu/toolbox/lns/

www.packetstormsecurity.com

www.samba.org

www.securityfocus.com

http://support.microsoft.com/kb/325864

www.tripwire.com

www.trustedcs.com www.us-cert.gov

Chapter 9

Embedded OSs

www.cve.mitre.org

http://hackaday.com

www.iso.org

www.milw0rm.com

http://nvd.nist.gov

www.packetstormsecurity.org

www.rtlinuxfree.com

Chapter 10

Web Server Security

www.adobe.com/support/security/

www.cve.mitre.org

www.microsoft.com/technet/security/current.aspx

www.owasp.org

www.packetstormsecurity.org

http://poweryogi.blogspot.com/2005/03/hbsapplyyourself-admit-status-snafu.html

www.us-cert.gov/cas/alerts/SA09-133B.html

Chapter 11

Wireless Networking

www.aircrack-ng.org

www.blackalchemy.to/project/fakeap/

www.coffer.com/mac_find

http://grouper.ieee.org/groups/802/

www.kismetwireless.net

www.netstumbler.com

http://nvd.nist.gov

www.oreillynet.com/cs/weblog/view/wlg/448

Chapter 12

Cryptography

http://cracker.offensive-security.com

http://csrc.nist.gov

http://freerainbowtables.com

www.gnupg.org

www.mandylionlabs.com/documents/BFTCalc.xls

www.nsa.gov/ia/programs/suiteb_cryptography

www.pgp.com

www.phreedom.org

www.rsa.com

www.truecrypt.org

Chapter 13

Network Protection Systems

www.bluecoat.com

www.ca.com

www.cert.org

www.cisco.com/security

www.cisecurity.org

www.enterasys.com

www.honeyd.org

www.honeynet.org

www.ibm.com

www.isc.sans.org/weblogs

www.keyfocus.net/kfsensor

http://labrea.sourceforge.net

www.mcafee.com

www2.netbaitinc.com

http://nepenthes.carnivore.it

http://nvd.nist.gov

www.redseal.net

www.ripe.net/news/study-youtube-hijacking.html

www.securityfocus.com/infocus/1659

www.snort.org

www.sourcefire.com

www.specter.com or www.spectorcne.com

www.symantec.com

http://valhalahoneypot.sourceforge.net

www.websense.com

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset