322 C.7 Endnotes
C.7 Endnotes
1. Pfleeger, C., Security in Computing. Englewood Cliffs, NJ: Pren-
tice-Hall, 1989.
2. https://www.it-isac.org.
3. Internet Engineering Task Force, RFC 2196: Site Security Hand-
book. September 1997. IETF NWG, B. Fraser, ed.
http://www.ietf.org.
4. Fites, M., P. Kratz, and A. Brebner, Control and Security of Com-
puter Information Systems. New York: Computer Science Press,
1989.
5. Handelsmann, Andrew. “Insider Threats to E-Security.”
Gigalaw.com, December 2001. http://www.gigalaw.com.
6. Ibid.
7. http://www.checkpoint.com/services/education/certification/
certifications/ccsa.html.
8. http://www.giac.org.

Get Business Continuity and Disaster Recovery for InfoSec Managers now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.