Intrusion Detection: Network Security beyond the Firewall
(Publisher: John Wiley & Sons, Inc.)
Author(s): Terry Escamilla
ISBN: 0471290009
Publication Date: 11/01/98

Table of Contents


Appendix
Hot Links for Information

To find papers on security and intrusion detection, public domain tools, and excellent hot links, visit COAST at www.cs.purdue.edu/coast. From there, you can find more security-related links than you possibly can investigate adequately.

The latest on Kerberos is found at ftp://athena-dist.mit.edu/pub/kerberos.

You can reach the International Computer Security Association at www.ncsa.com. There, you will find numerous links to vendors who build security products.

For the latest on NT security, visit www.microsoft.com/security.

Many papers are available for download from ftp.research.att.com

Incident Response Organizations

Forum of Incident and Response Security Teams (FIRST) can be reached at www.first.org or by phone at +1–301–975–3359.

CERT can be contacted at www.cert.org or by phone at +1–412–268–7090. In addition, there are many CERT organizations available in other countries.

AUSCERT, the Australian counterpart to CERT in the United States, is found at www.auscert.org.au. The phone number is +61–7–3365–4417.

The IBM Emergency Response Team can be reached at www.ers.ibm.com.

Intrusion Detection Research

In addition to visiting vendor sites mentioned in this book, you can learn more about intrusion detection research at the following links:

www.cs.purdue.edu/coast
www.seclab.cs.ucdavis.edu/cidf
www.seclab.cs.ucdavis.edu
www.crl.sri.com/ides
www.sri.com/emerald
www.pokey.nswc.navy.mil/Docs/intrusion.html
www.doe-is.llnl.gov/nitb/refs/bibs/bib1.html


Table of Contents