CCSP CSI Exam Cram 2 (Exam Cram 642-541)

Hundreds, if not thousands, of books have been published on IT security, and a large portion of them address network security in addition to host security. These are books that I have or have used (borrowed and browsed, if not read closely). Any of them would be a good use of your time.

Allen, Julia H. The CERT Guide to System and Network Security Practices . Boston: Addison-Wesley, 2001.

Cheswick, William R., Teven M. Bellovin, and Aviel D. Rubin. Firewalls and Internet Security, Second Edition: Repelling the Wily Hacker . Boston: Addison-Wesley, 2003.

Hines, Annlee A. Planning for Survivable Networks . Indianapolis, Indiana: Wiley Publishing, Inc., 2002.

Kaeo, Merike. Designing Network Security . Indianapolis, Indiana: Cisco Press, 1999.

McCarthy, Mary Pat and Stuart Campbell. Security Transformation: Digital Defense Strategies to Protect Your Company's Reputation and Market Share . New York: McGraw-Hill, 2001.

McClure, Stuart, Joel Scambray and George Kurtz. Hacking Exposed: Network Security Secrets and Solutions , Fourth Edition . New York: McGraw-Hill Osborne Media, 2003.

Mitnick, Kevin. The Art of Deception: Controlling the Human Element of Security . Indianapolis, Indiana: Wiley Publishing, Inc., 2002.

Power, Richard. Tangled Web: Tales of Digital Crime from the Shadows of Cyberspace . Indianapolis, Indiana: Que, 2000.

Vacca, John R. Computer Forensics: Computer Crime Scene Investigation . Hingham, Massachusetts: Charles River Media, Inc., 2002.

Wadlow, Thomas. The Process of Network Security . Boston: Addison-Wesley, 2000.

Walsh, James. Asset Protection and Security Management Handbook . Boca Raton, Florida: Auerbach Publications, 2002.

Wenstrom, Michael. Managing Cisco Network Security . Indianapolis, Indiana: Cisco Press, 2001.

Категории