Further Reading
Building an X.500 Directory Service in the US (RFC 1943). B. Jennings, 1996. Available on the World Wide Web at http://www.ietf.org/rfc/rfc1943.txt.Computer Emergency Response Team (CERT) Coordination Center, http://www.cert.org.Counter Hack: A Step-by-Step Guide to Computer Attacks and Effective Defenses . E. Skoudis, Prentice Hall PTR, 2002.Hacking Exposed: Network Security Secrets & Solutions . S. McClure, J. Scambray, and G. Kurtz, McGraw-Hill Professional Publishing, 2001.Internet Cryptography . R. Smith, Addison-Wesley, 1997.Intrusion Detection Hotlist, http://www.cerias.purdue.edu/coast/ids.Network Intrusion Detection Systems FAQ . Robert Graham, 2000. Available on the World Wide Web at http://www.robertgraham.com/pubs/network-intrusion-detectionl.Privacy on the Line: The Politics of Wiretapping and Encryption . W. Diffie and S. Landau, MIT Press, 1998.Simple Authentication and Security Layer (SASL) (RFC 2222). John Myers, 1997. Available on the World Wide Web at http://www.ietf.org/rfc/rfc2222.txt.The TLS Protocol Version 1.0 (RFC 2246). T. Dierks and C. Allen, 1999. Available on the World Wide Web at http://www.ietf.org/rfc/rfc2246.txt.Understanding Digital Signatures: Establishing Trust over the Internet and Other Networks . G. Grant, McGraw-Hill, 1997.Understanding the Public-Key Infrastructure . C. Adams, S. Lloyd, and S. Kent, New Riders Publishing, 1999.