References

[bib-01] Nancy, Altholz, and Stevenson. Larry Rootkits for Dummies (For Dummies (Computer/Tech)). New York: John Wiley and Sons Ltd., 2007.

[bib-02] Edward. Amoroso, Cyber Security. Summit, NJ: Silicon Press, 2006.

[bib-03] James M., Aquilina, Casey, Eoghan and H. Malin. Cameron Malware Forensics: Investigating and Analyzing Malicious Code. Burlington, MA: Syngress, 2008.

[bib-04] Sandy. Bacik, Building an Effective Information Security Policy Architecture. Boca Raton, FL: CRC Press, 2008.

[bib-05] Messaoud. Benantar, Access Control Systems: Security, Identity Management and Trust Models. New York: Spring, 2005.

[bib-06] Yusuf. Bhaiji, Network Security Technologies and Solutions (CCIE Professional Development Series). Indianapolis: Cisco ...

Get Fundamentals of Information Systems Security now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.