Need to Know More?
For further information on device and media security, and security topology, consult the following books:
Hausman, Kirk, Diane Barrett, and Martin Weiss. Security+ Exam Cram 2. Indianapolis, IN: Que Publishing, 2003. Chapter 6, "Infrastructure Security."
King, Todd and David Bittlingmeier. Security+ Training Guide. Indianapolis, IN: Que Publishing, 2003. Chapter 3, "Devices, Media, and Topology Security."
Taylor, Tiffany, ed. Security Complete. Alameda, CA: Sybex, Inc., 2002.
For further information on VPNs and their implementation (as well as additional information on general network security), see the following:
Northcutt, Stephen, Lenny Zeltser, Scott Winters, Karen Frederick, and Ronald W. Ritchey. Inside Network Perimeter Security: The Definitive Guide to Firewalls, VPNs, Routers, and Intrusion Detection Systems. Indianapolis, IN: New Riders, Inc., 2003.
For further information on network troubleshooting tools, check out this book:
Sloan, Joseph D. Network Troubleshooting Tools. Sebastopol, CA: O'Reilly & Associates, Inc., 2001.
For further information on network monitoring and analysis, see the following:
Wilson, Ed. Network Monitoring and Analysis: A Practical Approach to Troubleshooting. Indianapolis, IN: Prentice Hall PTR, 2000.
For further information on bastion hosts, consult the following:
Norberg, Stefan. Securing Windows NT/2000 Servers on the Internet. Sebastopol, CA: O'Reilly. 2000.
For further information on VLANs, see this book:
Seifert, Rich. The Switch Book: The Complete Guide to LAN Switching Technology. New York, NY: John Wiley & Sons, Inc., 2000.
For further information on intrusion detection and response, see the following books:
Hausman, Kirk, Diane Barrett, and Martin Weiss. Security+ Exam Cram 2. Indianapolis, IN: Que Publishing, 2003. Chapter 7, "Intrusion Detection and Security Baselines."
King, Todd and David Bittlingmeier. Security+ Training Guide. Indianapolis, IN: Que Publishing, 2003. Chapter 4, "Intrusion Detection, Baselines, and Hardening."
Pipkin, Donald. Information Security: Protecting the Global Enterprise, First Edition. Upper Saddle River, NJ: Prentice Hall, 2002.
Shinder, Debra. Scene of the Cybercrime: Computer Forensics Handbook. Rockland, MA: Syngress. Chapter 9, "Implementing Cybercrime Detection Techniques," and Chapter 10, "Collecting and Preserving Digital Evidence."
For further information on security baselines and system hardening, consult the following resources:
Hausman, Kirk, Diane Barrett, and Martin Weiss. Security+ Exam Cram 2. Indianapolis, IN: Que Publishing, 2003. Chapter 7, "Intrusion Detection and Security Baselines."
King, Todd and David Bittlingmeier. Security+ Training Guide. Indianapolis, IN: Que Publishing, 2003. Chapter 4, "Intrusion Detection, Baselines, and Hardening."
Chapter 8, Security Baselines, http://www.docendo.se/mspress/msp_online/samplechapter/0735618224.htm.
For further information on MBSA and SCA, see the following:
Smith, Ben and Brian Komar. Microsoft Windows Security Resource Kit. Redmond, WA: Microsoft Press, 2003. Chapter 24, "Using Security Assessment Tools."
For further information on system and network hardening, see the following:
Bragg, Roberta. Hardening Windows Systems. Emeryville, CA: McGraw Hill/Osborne, 2004.
For further information on application server hardening, check out the following resources:
Smith, Ben and Brian Komar. Microsoft Windows Security Resource Kit. Redmond, WA: Microsoft Press, 2003. Part IV: "Securing Common Services."
Chapter 8, Security Baselines, http://www.docendo.se/mspress/msp_online/samplechapter/0735618224.htm.
For further information on Linux security, see the following:
Toxen, Bob. Real World Linux Security, 2nd Edition. Upper Saddle River, NJ: Prentice Hall PTR, 2002.
For further information on Unix security, see the following:
Spafford, Gene, Simson Garfinkel, and Alan Schwartz. Practical Unix and Internet Security, 3rd Edition. Sebastopol, CA: O'Reilly & Associates, Inc., 2003.