cc/td/doc/product/iaabu/centri4
hometocprevnextglossaryfeedbacksearchhelp
PDF

Table of Contents

Recommended Readings

Recommended Readings

Introduction

Because firewalls and network security are difficult concepts to master, you should read documents that are beyond the narrow scope of this guide when planning the security of your network. This appendix provides a list of publications that support this guide, either directly or conceptually. While these publications may not be simple, they are well written and provide a strong foundation on which to make security decisions.

The "TCP/IP and Networking" section defines publications that define core networking concepts. The "Network Security" section defines publications that describe core network security concepts, such as firewalls, encryption, and secure protocols.

The "Windows NT Security" section identifies publications that help you get the best security from your Windows NT operating system. The "Security Policy Design" section identifies publications that address how to develop security polices from an overall organizational perspective as well as from a network security perspective.

TCP/IP and Networking

Heywood, D., Networking with Microsoft TCP/IP, Indianapolis: New Riders Publishing, 1996.

Stevens, W.R., TCP/IP Illustrated, Volume 1: The Protocols, Addison-Wesley, 1994.

Postel, J., User Datagram Protocol, STD 6, RFC 768, USC/Information Sciences Institute, August 1980.

Postel, J., ed., Transmission Control Protocol - DARPA Internet Program Protocol Specification, STD 7, RFC 793, USC/Information Sciences Institute, September 1981.

Network Security

Gasser, M., Building a Secure Computer System, New York:Van Nostrand Reinhold, 1988. (Specifically Chapter 13, "Networks and Distributed Systems.")

Chapman, D. B., and Elizabeth D. Zurichy, Building Internet Firewalls, Sebastopol:O'Reilly & Associates, Inc., September 1995.

Cheswick, William R., and Steven M. Bellovin, Firewalls and Internet Security: Repelling the Wiley Hacker, Reading:Addison-Wesley Publishing Company, 1994.

Shaffer, Steven L., and Alan R. Simon, Network Security, Cambridge:AP Professional, 1994.

Windows NT Security

Custer, Helen, Inside Windows NT, Redmond: Microsoft Press, 1993.

Microsoft Windows NT 3.5 : guidelines for security, audit, and control, Redmond:Microsoft Press, 1994.

Sutton, Stephen A., Windows NT Security Guide, Reading:Addison-Wesley Developers Press, 1997.

Security Policy Design

Hare, R. Christopher E. and Karanjit Siyan. Internet Firewalls and Network Security, Indianapolis:New Riders Publishing, 1995. (Specifically Chapter 3, "Designing a Network Policy.")


hometocprevnextglossaryfeedbacksearchhelp
Posted: Sat Sep 28 22:57:30 PDT 2002
All contents are Copyright © 1992--2002 Cisco Systems, Inc. All rights reserved.
Important Notices and Privacy Statement.