[bib003] Firewalls and Internet Security: Repelling the Wily Hacker. 2nd ed. Boston: Addison-Wesley Professional, 2003.
, Steven M. Bellovin, and Aviel D. Rubin.[bib004] Cisco Systems. Internetworking Technologies Handbook, Virtual Private Networkks. http://www.cisco.com/en/US/docs/internetworking/technology/handbook/VPN.html (accessed July 15, 2010).
[bib005] CNN. "How the President's secret helicopter plans wound up in Iran." March 2009. http://ac360.blogs.cnn.com/2009/03/10/how-the-presidents-secret-helicopter-plans-wound -up-iran/ (accessed July 15, 2010).
[bib006] Hiding in Plain Sight: Steganography and the Art of Covert Communication. Indianapolis: Wiley Publishing, Inc., 2003.
.[bib008] Comer, Douglas E. Internetworking with TCP/IP, Vol 1. 5th ed. Upper Saddle River, NJ: Prentice Hall, 2005.
[bib009] Deploying Virtual Private Networks with Microsoft Windows Server 2003 (Technical Reference). Redmond, WA: Microsoft Press, 2003.
, and Elliot Lewis.[bib010] Hacking Exposed Malware and Rootkits. New York: McGraw-Hill Osborne Media, 2009.
, Sean Bodmer, and Aaron LeMasters.[bib011] Defense Information Systems Agency (DISA). "Information Assurance Support Environment (IASE), Security Checklists." http://iase.disa.mil/stigs/checklist/index.html (accessed July 15, 2010).
[bib012] Defense Information Systems Agency (DISA). "Information Assurance Support Environment (IASE), Security Technical Implementation Guides (STIGS)." http://iase.disa.mil/stigs/stig/index.html (accessed July 15, 2010). DeLaet, Gert, and Gert Schauwers. Network Security Fundamentals. Indianapolis: Cisco Press, 2004
[bib013] Network Security: Current Status and Future Directions. Hoboken, NJ: Wiley-IEEE Press, 2007.
, and .[bib014] Dr. K. Hackers' Handbook 3.0 (Expanded, Revised and Updated): Includes WiFi, Identity Theft, Information Warfare and Web 2.0. New York: Carlton Books, 2009.
[bib018] 2005.
, et al. "Guide to Ipsec VPNs: Recommendations of the National Institute of Standards and Technology." Special publication 800-77. Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology,[bib023] _______, Gray Hat Hacking, Second Edition: The Ethical Hacker's Handbook. New York: McGraw-Hill Osborne Media, 2007.
, , and .[bib026] Internet Engineering Task Force (IETF). "Internet Key Exchange (IKEv2) Protocol." December 2005. http://tools.ietf.org/html/rfc4306 (accessed July 15, 2010).
[bib027] Virtual Private Networks. 2nd ed. Sebastopol, CA: O'Reilly Media, 1998.
, Charlie Scott, and Paul Wolfe.[bib028] ISA Server.org. "Setting Up the Windows XP PPTP and L2TP/IPSec client." http://www.isaserver.org/img/upl/vpnkitbeta2/xpvpnclient.htm (accessed July 15, 2010).
[bib029] Introduction to Modern Cryptography: Principles and Protocols. Chapman & Hall/CRC, 2007.
, and .[bib030] Firewalls for Dummies. 2nd ed. Indianapolis: Wiley Publishing, Inc., 2003.
, Ronald Beekelaar, and Joern Wettern.[bib031] The TCP/IP Guide: A Comprehensive, Illustrated Internet Protocols Reference. San Francisco: No Starch Press, 2005.
.[bib034] Linux Home Networking. "Configuring Linux VPNs." http://www.linuxhomenetworking.com/wiki/index.php/Quick_HOWTO_:_Ch35_:_Configuring_Linux_VPNs (accessed July 15, 2010).
[bib036] No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing. Rockland, MA: Syngress, 2008.
and .[bib037] Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning. City: Nmap Project, 2009.
.[bib040] Hacking Exposed: Network Security Secrets and Solutions. 6th ed. New York: McGraw-Hill Osborne Media, 2009.
, , and .[bib042]
. "IPSec/Netkey interaction with IPTables/Netfilter." Openswan open forum entry. http://lists.openswan.org/pipermail/users/2005-August/006101.html (accessed July 15, 2010).[bib043] Microsoft Technet. "DirectAccess Technical Overview." http://technet.microsoft.com/library/dd637827.aspx (accessed July 15, 2010).
[bib044] The Art of Deception: Controlling the Human Element of Security. Indianapolis: Wiley Publishing, Inc., 2003.
, , and .[bib045] _____, and The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers. Indianapolis: Wiley Publishing, Inc., 2005.
.[bib046] MITRE Corporation. "MITRE's Common Vulnerability Database (CVE)." http://cve.mitre.org/ (accessed July 15, 2010).
[bib047] National Institute of Standards and Technology (NIST), National Vulnerability Database. http://nvd.nist.gov/ (accessed July 15, 2010).
[bib048] Wireless Security: Models, Threats, and Solutions. New York: McGraw-Hill Osborne Media, 2001.
, and .[bib050] Off-line certificate enrolment on Windows 2000/XP. http://www.jacco2.dds.nl/networking/certutil.html (accessed June 21, 2010).
[bib052] Hacking Exposed Computer Forensics. 2nd ed. New York: McGraw-Hill Osborne Media, 2009.
, , and .[bib053] PopTop + MSCHAPv2 + Samba + Radius + Microsoft Active Directory + Fedora Howto. http://www.members.optushome.com.au/~wskwok/poptop_ads_howto_1.htm (accessed July 15, 2010).
[bib054] Real Time Enterprises, Incorporated. "Create a IPSEC + Certificates MMC." http://support.real-time.com/open-source/ipsec/index.html (accessed July 15, 2010).
[bib056] How to Cheat at Designing Security for a Windows Server 2003 Network. Rockland, MA: Syngress, 2006.
, and .[bib057] SANS. "The Top Cyber Security Risks." http://www.sans.org/top-cyber-security-risks/?ref=top20 (accessed July 15, 2010).
[bib058] Guidelines on Firewalls and Firewall Policy: Special Publication 800-41, Revision 1. Washington: National Institute of Standards and Technology (NIST), 2009.
, and .[bib059] Schneier's Cryptography Classics Library: Applied Cryptography, Secrets and Lies, and Practical Cryptography. Indianapolis: Wiley Publishing, Inc., 2007.
.[bib060] _____. Secrets and Lies: Digital Security in a Networked World. Indianapolis: Wiley Publishing, Inc., 2004.
[bib061] Router Security Strategies: Securing IP Network Traffic Planes. Indianapolis: Cisco Press, 2008.
, and .[bib062] Security Focus. "Embassy leaks highlight pitfalls of Tor. September, 2007." http://www.securityfocus.com/news/11486 (accessed July 15, 2010).
[bib064] SmoothWall Community Forums. http://community.smoothwall.org/forum/ (accessed July 15, 2010).
[bib070] _____, Ed Tittel, and Mike Chapple. CISSP: Certified Information Systems Security Professional Study Guide. 4th ed. Indianapolis: Sybex, 2008.
[bib072]
., (2000, April 3). Businesses Lock In On VPN Outsourcing Options Providers of virtual private network services put a new spin on the outsourcing spiel. InformationWeek. http://www.informationweek.com/780/vpn.htm (accessed July 15, 2010).[bib073] "Using a Linux L2TP/IPsec VPN server." May 2010. http://www.jacco2.dds.nl/networking/openswan-l2tp.html (accessed July 15, 2010).
[bib076] LAN Switch Security: What Hackers Know About Your Switches. Indianapolis: Cisco Press, 2007.
, and .[bib077] Guide to Firewalls and Network Security. Florence, KY: Course Technology/Cengage Learning Inc., 2008.
, , , and .