Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 3

REFERENCES

Books:

1. Richard Bejtlich. Tao of Network Security Monitoring: Beyond Intrusion

Detection.

2. Roberta Bragg, Mark Rhodes-Ousley, Keith Strassberg. 2004. The

Complete Reference. Network Security. California, USA: Brandon A.

Nordin.

3. Michael Rash, Angela Orebaugh, Graham Clark, Becky Pinkard, Jake

Babbin. 2005. Intrusion Prevention and Active Response. Deploying

Network and Host IPS. Rockland. Syngress Publishing Inc.

4. Jan L. Harrington. 2005. NETWORK SECURITY: A Practical Approach. San

Francisco: Morgan Kaufman Publisher.

5. V. Korneev, A. Kiselev. 2004. MODERN MICROPROCESSORS. Third

Edition. Massachusetts: Charles River Media.

Journals:

1. Karen Scarfone, Peter Mell. National Institute of Standards and

Technology journal  "Guide to Intrusion Detection and Prevention

Systems, SP800-94" by (retrieved on 1 January 2010).


2. Lunt, Teresa F., "IDES: An Intelligent System for Detecting Intruders,"

Proceedings of the Symposium on Computer Security; Threats, and

Countermeasures; Rome, Italy, November 22–23, 1990, pages 110–121.

3. Lunt, Teresa F., "Detecting Intruders in Computer Systems," 1993

Conference on Auditing and Computer Technology, SRI International.

4. Anton Chuvakin and Vladislav V. Myasnankin. Complete Snort-based IDS

Architecture, Part One.

5. David Kinn and Kevin Timm. Justifying the Expense of IDS, Part One: An

Overview of ROIs for IDS.

6. Leander Kahney. Mac Supercomputer: Fast, Cheap.

7. Mark Baker and Rajkumar Buyya. Cluster Computing at a Glance. Division

of Computer Science, University of Portsmouth.

8. Rajkumar Buyya. Single System Image. Monash University, Australia.

9. Michael Creel. PelicanHPC Tutorial. Universitat Autònoma de Barcelona.

10. Simon Tatham. Putty User Manual. Tartarus team member.

Electronic Materials:

1. http://portal.acm.org.lib1.library.unikl.edu.my/citation.cfm?

id=1278940.1278949&coll=ACM&dl=ACM&CFID=83897297&CFTOKEN=2

8630346

2. http://www.symantec.com/connect/articles/justifying-expense-ids-part-

one-overview-rois-ids
3. http://www.symantec.com/connect/articles/complete-snort-based-ids-

architecture-part-one

4. http://oreilly.com/catalog/9780596007911

5. http://whitepapers.techrepublic.com.com/thankyou.aspx?

&docid=266711&view=266711&load=1&regSrc=wp&authId=JgySb1ccZp

7JfaOGnWkQd6uWU2qFWGuPLEZCXPbKl7TfSm3Ar2j82tIBq7wZ/pc/

6. http://www.informit.com/articles/article.aspx?p=21778&seqNum=1

7. http://forum.pfsense.org/index.php?topic=20142.msg108467

8. http://www.snort.org/assets/125/snort_manual-2_8_5_1.pdf

9. http://the.earth.li/~sgtatham/putty/0.60/puttydoc.txt

10. http://www.snort.org/assets/125/snort_manual-2_8_5_1.pdf

You might also like