Security |
The following books provide additional information about IIS 5.0 and about other features of Windows 2000 Server.
Fundamentals of Computer Security Technology by E. Amoroso, 1994, Upper Saddle River: Prentice Hall.
Computer Security by D. Gollman, 1999, New York: Wiley.
PCWeek Intranet & Internet Firewall Strategies by E. Amoroso and R. Sharp, 1996, Indianapolis: ZD Press.
Firewalls & Internet Security: Repelling the Wily Hacker by W.R. Cheswick and S.M. Bellovin, 1994, Reading: Addison Wesley.
Internet Security—Risk Analysis, Strategies & Firewalls by O. Kyas, 1996, Washington, D.C.: Thomson.
Web Proxy Servers by A. Luotonen, 1997, Upper Saddle River: Prentice Hall.
Maximum Security: A Hacker’s Guide to Protecting your Internet Site and Network Second Edition, anonymous, 1998, Indianapolis: Sams.
Intrusion Detection by T. Escamilla, 1998, New York: Wily.
The Cuckoo’s Egg by C. Stoll, 1995, Sydney: Pan MacMillan.
Database Security by S. Castano, M. Fugini, G. Martella, et al., 1994, Reading: Addison Wesley.
Security Protocols by B. Christianson, et al., 1997, Berlin: Springer.
Davis, P.T., ed. Securing Client/Server Networks by P.T. Davis, ed., 1996, Maidenhead: McGraw-Hill.
Protecting Yourself Online by Electronic Frontier Foundation, 1998, New York: HarperCollins.
Digital Certificates by J. Feghhi, et al., 1998, Reading: Addison Wesley.
Secure Electronic Commerce by W. Ford and M.S. Baum, 1997, Upper Saddle River: Prentice Hall.
Computer Communications Security by W. Ford, 1994, Upper Saddle River: Prentice Hall.
Practical Unix & Internet Security by S. Garfinkel and G. Spafford, 1996, Sebastopol: O’Reilly & Associates.
Web Security & Commerce, 1997, Sebastopol: O’Reilly & Associates.
Actually Useful Internet Security Techniques by L. Hughes, 1995, Indianapolis: New Riders.
Computer Security Reference Book by K.M. Jackson and J. Hruska, 1992, Perth: CRC.
Java Security, Hostile Applets, Holes & Antidotes by G. McGraw and E. Felten, 1996, New York: Wiley.
Computer Related Risks by P. Neumann, 1995, Reading: Addison Wesley.
Internet & TCP/IP Network Security by U.O. Pabrai and V.K. Gurbani, 1996, Maidenhead: McGraw Hill.
Web Security Sourcebook by A.D. Rubin, D. Geer, and M.J. Ranum, 1997, New York: Wiley.
Computer Security Basics by D. Russell and G.T. Gangemi, 1991, Sebastopol: O’Reilly & Associates.
Digital Money by D.C. Lynch and L. Lundquist, 1995, New York: Wiley.
Web Security—A Matter of Trust, by a collection of authors, Summer 1997, World Wide Web Journal, Vol. No. 3, Sebastopol: O’Reilly & Associates.
Information Security Policies Made Easy by C.C. Wood, 1998, Sausalito: Baseline Software.
Secure Computing Threats and Safeguards by R.C. Summers, 1997, Maidenhead: McGraw-Hill.
Cracking DES, Electronic Frontier Foundation, 1998, Sebastopol: O’Reilly & Assoc.
Applied Cryptography, Second Edition by B. Schneier, 1996, New York: Wiley.
Cryptography and Network Security Principles and Practice by W. Stallings, 1998, Upper Saddle River: Prentice Hall.
Protect Your Privacy by R.B. Gelman and S. McCandish, 1995, Upper Saddle River: Prentice Hall.
Internet Security with Windows NT by M.J. Edwards, 1998, Loveland: Duke Press.
Microsoft Windows NT 4.0 Security, Audit, and Control by J.G. Jumes, et al, 1998, Redmond: Microsoft Press.
Windows NT Security—Programming Easy-to-Use Security Options by N. Okuntseff, 1997, Gilroy: R&D Books.
NCSA Guide to Windows NT Security by C.B. Rutstein, 1997, Maidenhead: McGraw-Hill.
Internetworking with TCP/IP, Volume I, Second Edition by E.C. Comer and D.L. Stevens, 1994, Upper Saddle Hill: Prentice Hall.
Internetworking with TCP/IP, Volume II, Second Edition by E.C. Comer and D.L. Stevens, 1994, Upper Saddle Hill: Prentice Hall.
Internetworking with TCP/IP, Volume III, Second Edition by E.C. Comer and D.L. Stevens, 1994, Upper Saddle Hill: Prentice Hall.
Internetworking with TCP/IP, Volume I, Second Edition, Windows Sockets Version by E.C. Comer and D.L. Stevens, 1997, Upper Saddle Hill: Prentice Hall.
Windows NT TCP/IP by K.S. Siyan, 1998, Indianapolis: New Riders.