20.12 RECOMMENDED READING

BRYANT, WILLIAM. “Designing an Authentication System: a Dialogue in Four Scenes.” web.mit.edu/kerberos/www/dialogue.html

CERT COORDINATION CENTER. “Intruder Detection Checklist.” www.cert.org/tech_tips/intruder_detection_checklist.html

CERT COORDINATION CENTER. “UNIX Configuration Guidelines.” www.cert.org/tech_tips/unix_configuration_guidelines.html

CHESWICK, WILLIAM R., AND STEVEN M. BELLOVIN. Firewalls and Internet Security, Second Edition. Reading, MA; Addison-Wesley. 2000.

CURTIN, MATT, AND MARCUS RANUM. “Internet Firewalls: Frequently Asked Questions.” www.interhack.net/pubs/fwfaq

FARMER, DAN, AND WIETSE VENEMA. “Improving the Security of Your Site by Breaking Into it.” 1993. www.fish.com/security

FRASER, B., ...

Get UNIX System Administration Handbook, Third Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.