Brocade; Survey Results Demonstrate Need for Integrated Approach to Network Security; Point Products Fall Short”, Network Business Weekly, Apr 5, 2010.
Bruce J.Fried, et al, Human Resources in Healthcare: Managing for Success,2nd ed. (Chapter 4)
Certified Ethical Hacker is Big News for Local Small Business: The Academy of Computer Education”, Business Wire, Dec 22, 2008.
Craig S.Wright The IT Regulatory and Standards Compliance Handbook: How to Survive Information Systems Audit and Assessments (Chapter 3)
Dobromir Todorov Mechanics of User Identification and Authentication: Fundamentals of Identity Management (Chapter 1, 2 and 3)
e-DMZ Security Selected as 2010 SC Magazine Best Regulatory Compliance Solution”, Business Wire, Mar 8, 2010.
Eric Cole, et al Network Security Bible (Chapter 5)
Harold F.Tipton, et al Information Security Management Handbook, 6th ed. (Chapters 19, 30, 87 and 106)
Harold F.Tipton, et al Official (ISC)2 Guide to the CISSP CBK(Domains 1 and 2)
Jay Kelley,et al Network Access Control for Dummies (Chapter 15)
Jeremy Moskowitz Group Policy: Management, Troubleshooting, and Security: For Windows Vista, Windows 2003, Windows XP, and Windows 2000(Chapter 1)
John R.Vacca Public Key Infrastructure: Building Trusted Applications and Web Services (Chapter 1)
Joseph Steinberg, et al SSL VPN: Understanding, Evaluating, and Planning Secure, Web-Based Remote Access
M.E. Kabay “Extensive Catalog Provides Security Controls for Contemporary Security Requirements”, Network World (Online), Nov 2, 2009.
Michael Coles, et al Expert SQL Server 2008 Encryption (Chapter 1)
Neil Wyler, ed. Juniper Networks Secure Access SSL VPN Configuration Guide (Chapter 9)
NetworkedPlanet: 50 Percent of Employees Admit to Losing Documents on the Company Network”, M2 Presswire, Apr 12, 2010.
Peter Stephenson “Applying Evolved Policy”, SC Magazine, Oct 2009, Vol. 20 Issue 10, (Page 39)
Poonam Khanna “Two-Factor Authentication is Key to Sound ID Management: Schmidt”, Computing Canada, Jun 17, 2005, Vol. 31 Issue 9, (Page 10)
Robert E.Larson, et al CCSP: Cisco Certified Security Professional Certification All-in-One Exam Guide(Chapter 4)
Secure Computing Shares Research Innovations and Best Practices In Email, Web and Domain Authentication; Technologists Discuss Reputation Systems and Authentication Protocols at 2007 Authentication Summit”, PR Newswire, Apr 17, 2007.
Seymour Bosworth, et al Computer Security Handbook, 5th ed. (Chapters 23, 67 and 69)
Steve Manzuik, et al Network Security Assessment: From Vulnerability to Patch (Chapter 2)
Yan Zhang, et al Handbook of Research on Wireless Security (Chapter XLIV)