20.12 RECOMMENDED READING
BRYANT, WILLIAM. “Designing an Authentication System: a Dialogue in Four Scenes.” web.mit.edu/kerberos/www/dialogue.html
CERT COORDINATION CENTER. “Intruder Detection Checklist.” www.cert.org/tech_tips/intruder_detection_checklist.html
CERT COORDINATION CENTER. “UNIX Configuration Guidelines.” www.cert.org/tech_tips/unix_configuration_guidelines.html
CHESWICK, WILLIAM R., AND STEVEN M. BELLOVIN. Firewalls and Internet Security, Second Edition. Reading, MA; Addison-Wesley. 2000.
CURTIN, MATT, AND MARCUS RANUM. “Internet Firewalls: Frequently Asked Questions.” www.interhack.net/pubs/fwfaq
FARMER, DAN, AND WIETSE VENEMA. “Improving the Security of Your Site by Breaking Into it.” 1993. www.fish.com/security
FRASER, B., ...
Get UNIX System Administration Handbook, Third Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.