Bibliography

[ch13biblio01entry01] 1 Laura Chappell and Roger Spicer. “Is Your Network Doomed?” NetWare Connection. http://www.nwconnection.com/jan-feb.96/doomed/. December 2001.

[ch13biblio01entry02] 2 Microsoft Corporation. “Exchange Server 2003 and Exchange 2000 Front-End and Back-End Topology.” July 29, 2004. http://www.microsoft.com/technet/prodtechnol/exchange/2003/library/febetop.mspx. August 25, 2004.

[ch13biblio01entry03] 3 National Infrastructure Protection Center. “Lion Internet Worm DDoS Targeting Unix Systems.” Advisory 01-005. March 23, 2001. http://www.nipc.gov/warnings/advisories/_2001/01-005.htm. December 2001.

[ch13biblio01entry04] 4 Global Incident Analysis Center. “Lion Worm.” April 18, 2001. http://www.sans.org/_y2k/lion.htm ...

Get Inside Network Perimeter Security, Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.