Reference Books

National Institute of Standard and Technology (NIST) Special Publications - various

Grimes, Roger A., Honeypots for Windows., (2005) -Page # of reference: Chapter 1: An Introduction to Honeypots ISBN:9781590593356

Lowe, Doug, Networking All-in-One for Dummies, (2011) -Pg: Controlling User Access with Permissions ISBN:9780470625873 

Ingram, D., Design - Build - Run: Applied Practices and Principles for Production-Ready Software Development., (2009).

Amies, Alex; Sluiman, Harm; Liu, Guo Ning, Infrastructure as a Service Cloud Concepts, (2012) -Developing and Hosting Applications on the Cloud. IBM Press.

Stallings, W., Network Security Essential (Second Edition). (2003) -Pg; 88-89

Whitman, Michael E.; Mattord, Herbert J.; and Green, A., (2012). Guide to firewalls and VPNs (Third Edition). Course Technology: Boston, MA.

Whitman, Michael E. and Mattord, Herbert J., (2009). Principles of Information Security (Third Edition). Course Technology: Boston, MA.

Bosworth, Seymour and Kabay, M.E. & (eds); Eric Whyne. Computer Security Handbook, Fifth Edition. ISBN:9780471716525

Prowell, Stacy & Kraus, Rob & Borkin, Mike, Seven deadliest network attacks, (2010) -Chapter 2: War Dialing ISBN:9781597495493

Haines, Brad., Seven deadliest wireless technologies attacks., (2010). ADVANCED WPA AND WPA2 CRACKING ISBN:9781597495417

Krause, Micki., Tipton, Harold F. Handbook of Information Security Management, (1997).

Orebaugh, A., & Pinkard, B., Nmap In the Enterprise: Your Guide to Network Scanning, (2008) -Chapter 1 - Introducing Network Scanning ISBN:9781597492416

Ligh, Michael Hale & Adair, Steven & Hartstein, Blake & Richard, Matthew, Malware analyst's cookbook: tools and techniques for fighting malicious code. (2011). ISBN:9780470613030

Debra Littlejohn Shinder, Michael Cross, Scene of the Cybercrime, Second Edition.

Vyncke, Eric & Paggen, Christopher., Lan switch security: what hackers know about your switches: a practical guide to hardening layer 2 devices and stopping campus network attacks., (2008). ISBN:9781587052569

 

Web Sources

https://www.owasp.org - OWASP - The Open Web Application Security Project:

http://www.postcastserver.com

http://www.n2net.net

http://www.pcmag.com/encyclopedia_term/0,1237,t=whitelist&i=54441,00.asp

http://www.infosecurity-magazine.com/view/26475/whitelisting-is-the-solution-for-the-national-infrastructure/

http://www.postcastserver.com/help/Internet_Black_and_White_Lists.aspx

http://netforbeginners.about.com

www.us-cert.gov

http://www.sans.edu/research/security-laboratory/article/it-separation-duties - SANS Technology Institute

http://www.openxtra.co.uk/articles/data-center-environmental

www.theiia.org

http://www.ietf.org - The Internet Engineering Task Force (IETF)

www.domaintools.com

http://www.auditnet.org

https://www.ncjrs.gov – National Criminal Justice Reference Service

http://searchvmware.techtarget.com

http://www.unesco.org – United nations Educational, Scientific and Cultural Organization

http://www.clir.org – Council on Library and Information Resources