References

[bib001] Kevin Beaver. Hacking For Dummies. 3rd ed. Indianapolis: Wiley Publishing, Inc., 2010.

[bib002] Yusuf Bhaiji. Network Security Technologies and Solutions. Indianapolis: Cisco Press, 2008.

[bib003] William R. Cheswick, Steven M. Bellovin, and Aviel D. Rubin. Firewalls and Internet Security: Repelling the Wily Hacker. 2nd ed. Boston: Addison-Wesley Professional, 2003.

[bib004] Cisco Systems. Internetworking Technologies Handbook, Virtual Private Networkks. http://www.cisco.com/en/US/docs/internetworking/technology/handbook/VPN.html (accessed July 15, 2010).

[bib005] CNN. "How the President's secret helicopter plans wound up in Iran." March 2009. http://ac360.blogs.cnn.com/2009/03/10/how-the-presidents-secret-helicopter-plans-wound -up-iran/ (accessed July 15, 2010).

[bib006] Eric Cole. Hiding in Plain Sight: Steganography and the Art of Covert Communication. Indianapolis: Wiley Publishing, Inc., 2003.

[bib007] _______.Network Security Bible. Indianapolis: Wiley Publishing, Inc., 2009.

[bib008] Comer, Douglas E. Internetworking with TCP/IP, Vol 1. 5th ed. Upper Saddle River, NJ: Prentice Hall, 2005.

[bib009] Joseph Davies, and Elliot Lewis. Deploying Virtual Private Networks with Microsoft Windows Server 2003 (Technical Reference). Redmond, WA: Microsoft Press, 2003.

[bib010] Michael Davis, Sean Bodmer, and Aaron LeMasters. Hacking Exposed Malware and Rootkits. New York: McGraw-Hill Osborne Media, 2009.

[bib011] Defense Information Systems Agency (DISA). "Information Assurance Support Environment (IASE), Security Checklists." http://iase.disa.mil/stigs/checklist/index.html (accessed July 15, 2010).

[bib012] Defense Information Systems Agency (DISA). "Information Assurance Support Environment (IASE), Security Technical Implementation Guides (STIGS)." http://iase.disa.mil/stigs/stig/index.html (accessed July 15, 2010). DeLaet, Gert, and Gert Schauwers. Network Security Fundamentals. Indianapolis: Cisco Press, 2004

[bib013] Christos Douligeris, and N. Serpanos Dimitrios. Network Security: Current Status and Future Directions. Hoboken, NJ: Wiley-IEEE Press, 2007.

[bib014] Dr. K. Hackers' Handbook 3.0 (Expanded, Revised and Updated): Includes WiFi, Identity Theft, Information Warfare and Web 2.0. New York: Carlton Books, 2009.

[bib015] Jon Erickson. Hacking: The Art of Exploitation. 2nd ed. San Francisco: No Starch Press, 2008.

[bib016] Markus Feilner. OpenVPN: Building and Integrating Virtual Private Networks. Packt Publishing, 2006.

[bib017] Jerry Lee Jr Ford. Absolute Beginner's Guide to Personal Firewalls. Indianapolis: Que, 2007.

[bib018] Sheila Frenkel, et al. "Guide to Ipsec VPNs: Recommendations of the National Institute of Standards and Technology." Special publication 800-77. Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology, 2005.

[bib019] Darril Gibson. MCITP Windows Server 2008 Server Administrator Study Guide. Indianapolis: Sybex, 2008.

[bib020] Kimberly Graves. CEH Certified Ethical Hacker Study Guide. Indianapolis: Sybex, 2010.

[bib021] Michael Gregg. Certified Ethical Hacker Exam Prep. Indianapolis: Que, 2006.

[bib022] Shon Harris. CISSP All-in-One Exam Guide. 5th ed. New York: McGraw-Hill Osborne Media, 2010.

[bib023] _______, Harper Allen, Eagle Chris, and Ness Jonathan. Gray Hat Hacking, Second Edition: The Ethical Hacker's Handbook. New York: McGraw-Hill Osborne Media, 2007.

[bib024] Qiang Huang, and Frahim Jazib. SSL Remote Access VPNs. Indianapolis: Cisco Press, 2008.

[bib025] IETF RFC Repository. http://www.ietf.org/rfc.html (accessed July 15, 2010).

[bib026] Internet Engineering Task Force (IETF). "Internet Key Exchange (IKEv2) Protocol." December 2005. http://tools.ietf.org/html/rfc4306 (accessed July 15, 2010).

[bib027] Mike Irwin, Charlie Scott, and Paul Wolfe. Virtual Private Networks. 2nd ed. Sebastopol, CA: O'Reilly Media, 1998.

[bib028] ISA Server.org. "Setting Up the Windows XP PPTP and L2TP/IPSec client." http://www.isaserver.org/img/upl/vpnkitbeta2/xpvpnclient.htm (accessed July 15, 2010).

[bib029] Jonathan Katz, and Lindell Yehuda. Introduction to Modern Cryptography: Principles and Protocols. Chapman & Hall/CRC, 2007.

[bib030] Brian Komar, Ronald Beekelaar, and Joern Wettern. Firewalls for Dummies. 2nd ed. Indianapolis: Wiley Publishing, Inc., 2003.

[bib031] Charles Kozierok. The TCP/IP Guide: A Comprehensive, Illustrated Internet Protocols Reference. San Francisco: No Starch Press, 2005.

[bib032] Neal Krawetz. Introduction to Network Security. Charles River Media, 2006.

[bib033] Mark Lewis. Comparing, Designing, and Deploying VPNs. Indianapolis: Cisco Press, 2006.

[bib034] Linux Home Networking. "Configuring Linux VPNs." http://www.linuxhomenetworking.com/wiki/index.php/Quick_HOWTO_:_Ch35_:_Configuring_Linux_VPNs (accessed July 15, 2010).

[bib035] Dale Liu, and Miller Stephanie, Lucas Mark, Singh Abhishek, and Davis Jennifer. Firewall Policies and VPN Configurations. Rockland, MA: Syngress, 2006.

[bib036] Johnny LongWiles JackPinzon Scott and D. Mitnick Kevin. No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing. Rockland, MA: Syngress, 2008.

[bib037] Gordon Fyodor Lyon,. Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning. City: Nmap Project, 2009.

[bib038] John Mairs. VPNs: A Beginner's Guide. New York: McGraw-Hill Osborne Media, 2001.

[bib039] Eric Maiwald. Network Security: A Beginner's Guide. 2nd ed. New York: McGraw-Hill Osborne Media, 2003.

[bib040] Stuart McClure, Scambray Joel, and Kurtz George. Hacking Exposed: Network Security Secrets and Solutions. 6th ed. New York: McGraw-Hill Osborne Media, 2009.

[bib041] Mark S. Merkow Virtual Private Networks for Dummies. Indianapolis: Wiley Publishing, Inc., 1999.

[bib042] Nigel Metheringham. "IPSec/Netkey interaction with IPTables/Netfilter." Openswan open forum entry. http://lists.openswan.org/pipermail/users/2005-August/006101.html (accessed July 15, 2010).

[bib043] Microsoft Technet. "DirectAccess Technical Overview." http://technet.microsoft.com/library/dd637827.aspx (accessed July 15, 2010).

[bib044] Kevin D. Mitnick, L. Simon William, and Wozniak Steve. The Art of Deception: Controlling the Human Element of Security. Indianapolis: Wiley Publishing, Inc., 2003.

[bib045] _____, and L. Simon William. The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers. Indianapolis: Wiley Publishing, Inc., 2005.

[bib046] MITRE Corporation. "MITRE's Common Vulnerability Database (CVE)." http://cve.mitre.org/ (accessed July 15, 2010).

[bib047] National Institute of Standards and Technology (NIST), National Vulnerability Database. http://nvd.nist.gov/ (accessed July 15, 2010).

[bib048] Randall K. Nichols, and C. Lekkas Panos. Wireless Security: Models, Threats, and Solutions. New York: McGraw-Hill Osborne Media, 2001.

[bib049] Wes Noonan, and Dubrawsky Ido. Firewall Fundamentals. Indianapolis: Cisco Press, 2006.

[bib050] Off-line certificate enrolment on Windows 2000/XP. http://www.jacco2.dds.nl/networking/certutil.html (accessed June 21, 2010).

[bib051] Thomas R. Peltier Information Security Risk Analysis. 3rd ed. Auerbach Publications, 2010.

[bib052] Aaron Philipp, Cowen David, and Davis Chris. Hacking Exposed Computer Forensics. 2nd ed. New York: McGraw-Hill Osborne Media, 2009.

[bib053] PopTop + MSCHAPv2 + Samba + Radius + Microsoft Active Directory + Fedora Howto. http://www.members.optushome.com.au/~wskwok/poptop_ads_howto_1.htm (accessed July 15, 2010).

[bib054] Real Time Enterprises, Incorporated. "Create a IPSEC + Certificates MMC." http://support.real-time.com/open-source/ipsec/index.html (accessed July 15, 2010).

[bib055] Mark Rhodes-OusleyBragg RobertaStrassberg Keith. Network Security: The Complete Reference. New York: McGraw-Hill Osborne Media, 2003.

[bib056] Chris Ruston, and Peiris Chris. How to Cheat at Designing Security for a Windows Server 2003 Network. Rockland, MA: Syngress, 2006.

[bib057] SANS. "The Top Cyber Security Risks." http://www.sans.org/top-cyber-security-risks/?ref=top20 (accessed July 15, 2010).

[bib058] Karn Scarfone, and Hoffman Paul. Guidelines on Firewalls and Firewall Policy: Special Publication 800-41, Revision 1. Washington: National Institute of Standards and Technology (NIST), 2009.

[bib059] Bruce Schneier. Schneier's Cryptography Classics Library: Applied Cryptography, Secrets and Lies, and Practical Cryptography. Indianapolis: Wiley Publishing, Inc., 2007.

[bib060] _____. Secrets and Lies: Digital Security in a Networked World. Indianapolis: Wiley Publishing, Inc., 2004.

[bib061] Gregg Schudel, and J. Smith David. Router Security Strategies: Securing IP Network Traffic Planes. Indianapolis: Cisco Press, 2008.

[bib062] Security Focus. "Embassy leaks highlight pitfalls of Tor. September, 2007." http://www.securityfocus.com/news/11486 (accessed July 15, 2010).

[bib063] Thomas W. Shinder The Best Damn Firewall Book Period. 2nd ed. Rockland, MA: Syngress, 2008.

[bib064] SmoothWall Community Forums. http://community.smoothwall.org/forum/ (accessed July 15, 2010).

[bib065] SmoothWall Limited. http://www.smoothwall.net/ (accessed July 15, 2010).

[bib066] SmoothWall Open Source Project. http://www.smoothwall.org/ (accessed July 15, 2010).

[bib067] Jon C. Snader VPNs Illustrated: Tunnels, VPNs, and IPsec. Boston: Addison-Wesley Professional, 2005.

[bib068] W. Richard Stevens, and R. Wright Gary. TCP/IP Illustrated, Volumes 1-3. Boston: Addison-Wesley Professional, 1994.

[bib069] James Michael Stewart. CompTIA Security+ Review Guide: SY0-201. Indianapolis: Sybex, 2008.

[bib070] _____, Ed Tittel, and Mike Chapple. CISSP: Certified Information Systems Security Professional Study Guide. 4th ed. Indianapolis: Sybex, 2008.

[bib071] Keith Strassberg, Rollie Gary, and Gondek Richard. Firewalls: The Complete Reference. New York: McGraw-Hill Osborne Media, 2002.

[bib072] T Sweeney., (2000, April 3). Businesses Lock In On VPN Outsourcing Options Providers of virtual private network services put a new spin on the outsourcing spiel. InformationWeek. http://www.informationweek.com/780/vpn.htm (accessed July 15, 2010).

[bib073] "Using a Linux L2TP/IPsec VPN server." May 2010. http://www.jacco2.dds.nl/networking/openswan-l2tp.html (accessed July 15, 2010).

[bib074] Virtual Private Network Consortium. http://www.vpnc.org/ (accessed July 15, 2010).

[bib075] Linda Volonino, and Redpath Ian. e-Discovery for Dummies. Indianapolis: Wiley Publishing, Inc, 2009.

[bib076] Eric Vyncke, and Paggen Christopher. LAN Switch Security: What Hackers Know About Your Switches. Indianapolis: Cisco Press, 2007.

[bib077] Michael E. Whitman, J. Mattord Herbert, Austin Richard, and Holden Greg. Guide to Firewalls and Network Security. Florence, KY: Course Technology/Cengage Learning Inc., 2008.

[bib078] Ruixi Yuan, and W. Timothy Strayer. Virtual Private Networks: Technologies and Solutions. Boston: Addison-Wesley Professional, 2001.

[bib079] Elizabeth D. Zwicky, Cooper Simon, and D. Brent Chapman. Building Internet Firewalls. 2nd ed. Sebastopol, CA: O'Reilly Media, 2000.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset