In particular the way he has diagrammed the protocol actions ( I admit - I work with diagrams much better than descriptions :} )
Cheers,
Bret
At 07:47 3/04/99 -0500, you wrote:
>>>>
What books would you guys suggest for references/"bibles" on computer security; specifically firewall security. I own a lot of security books, but the two most appropriate to the topic at hand are: Building Internet Firewalls (Chapman, Zwickey) and Cisco TCP/IP (Lewis). Has anyone had any experience with these books? What books do you think are worth reading/buying and WHY?<<<<
I hope this message can turn into a forum for discussion of security books in general.
Thanks in advance for the feedback.
eli
--
=========================================================
Export-a-crypto-system-sig
RSA-3-lines-PERL
#!/bin/perl -sp0777i<X+d*lMLa^*lN%0]dsXx++lMlN/dsM0<j]dsj
$/=unpack('H*',$_);$_=`echo 16dio\U$k"SK$/SM$n\EsN0p[lN*1
lK[d2%Sa2/d0$^Ixp"|dc`;s/\W//g;$_=pack('H*',/((..)*)$/)
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Technical Incursion Countermeasures
[EMAIL PROTECTED] http://www.ticm.com/
ph: (+61)(041) 4411 149(UTC+8 hrs) fax: (+61)(08) 9454 6042
The Insider - a e'zine on Computer security Vol 3 Issue 1 out now
http://www.ticm.com/info/insider/index.html - [To unsubscribe, send mail to [EMAIL PROTECTED] with "unsubscribe firewalls" in the body of the message.]
