On Wed, 30 May 2001, Graham, Randy (RAW) wrote:
> IDS:
> ----
>
> Network Intrusion Detection: An Analysts' Handbook - Northcutt
> Intrusion Signatures and Analysis - Northcutt
these are good from a practical standpoint, but theory is needed to really
evaluate products and interpret situations. i really like:
intrusion detection -- rebecca gurly bace
> Cryptography:
> -------------
>
> Applied Cryptography - Schneier
again, an excellent 'must have' on someone's shelf if they're looking at
products that use ciphers and need to know some of their properties. i'm
still not a big fan of schneier's teaching style, i reccomend as a
supplement:
Cryptography and Network Security, Principles and Practice -- william
stallings
just my additions. i could go on and on .. i read a lot and assimilate a
lot of information. but .. you gotta start somewhere.
amazon.com has some neat listmania lists on security books, too.
____________________________
jose nazario [EMAIL PROTECTED]
PGP: 89 B0 81 DA 5B FD 7E 00 99 C3 B2 CD 48 A0 07 80
PGP key ID 0xFD37F4E5 (pgp.mit.edu)
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]