On Wed, 30 May 2001, Graham, Randy (RAW)  wrote:

> IDS:
> ----
>
>   Network Intrusion Detection: An Analysts' Handbook - Northcutt
>   Intrusion Signatures and Analysis - Northcutt

these are good from a practical standpoint, but theory is needed to really
evaluate products and interpret situations. i really like:

intrusion detection -- rebecca gurly bace

> Cryptography:
> -------------
>
>   Applied Cryptography - Schneier

again, an excellent 'must have' on someone's shelf if they're looking at
products that use ciphers and need to know some of their properties. i'm
still not a big fan of schneier's teaching style, i reccomend as a
supplement:

Cryptography and Network Security, Principles and Practice -- william
        stallings

just my additions. i could go on and on .. i read a lot and assimilate a
lot of information. but .. you gotta start somewhere.

amazon.com has some neat listmania lists on security books, too.

____________________________
jose nazario                                                 [EMAIL PROTECTED]
                     PGP: 89 B0 81 DA 5B FD 7E 00  99 C3 B2 CD 48 A0 07 80
                                       PGP key ID 0xFD37F4E5 (pgp.mit.edu)

-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to