Appendix H. Further Reading

The following books are recommended for further reading.

Brenton, Chris, with Cameron Hunt . 2001. Active Defense: A Comprehensive Guide to Network Security. San Francisco: Sybex. ISBN 0-7821-2916-1.

Cheswick, William R., Steven M. Bellovin, and Aviel D. Rubin . 2003. Firewalls and Internet Security: Repelling the Wily Hacker. 2nd ed. Boston, MA: Addison-Wesley. ISBN 0-201-63466-X.

Garfinkel, Simson, and Gene Spafford . 1995. Practical UNIX and Internet Security. Sebastopol, CA: O'Reilly & Associates. ISBN 1-565-92148-8.

McClure, Stuart, Saumil Shah, and Shreeraj Shah . 2003. Web Hacking. Boston, MA: Addison-Wesley. ISBN 0-201-76176-9.

McClure, Stuart, Joel Scambray, and George Kurtz . 2003. Hacking Exposed: Network ...

Get Essential Check Point™ FireWall-1® NG: An Installation, Configuration, and Troubleshooting Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.