[1]
|
T. McGuiness, “Defense in Depth,” SANS Institute, Bethesda, 2001.
|
[2]
|
M. Luallen, and S. Hamburg (2009) Applying Security Defense-In-Depth,” Control Engineering, 2009, pp. 49-51.
|
[3]
|
R. Weaver, “Guide to Network Defense and Countermeasures,” Course Technology, Boston, 2007.
|
[4]
|
National Security Agency, “Defense in Depth,” 2012.
http://www.nsa.gov/ia/_files/ support/defenseindepth.pdf
|
[5]
|
S. Groat, J. Tront and R. Marchany, “Advancing the Defense in Depth Model,” The 7th International Conference on System of Systems Engineering (SoSE), Genoa, 16-19 July 2012, pp. 285-290.
|
[6]
|
Defense Information Systems Agency, “Network Infrastructure Technology Overview,” Department of Defense, Ft. Meade, 2010.
|
[7]
|
C. Paquet, “Implementing Cisco IOS Network Security: Authorized Self-Study Guide,” Cisco Press, Indianapolis, 2009.
|
[8]
|
L. MacVittie and D. Holmes, “The New Data Center Firewall Paradigm,” F5 Networks, Inc., Seattle, 2012.
|
[9]
|
P. E. Small, “Defense in Depth: An Impractical Strategy for a Cyber World.” SANS Institute, Bethesda, 2011.
|
[10]
|
L. MacVittie, “F5 Friday: Goodbye Defense in Depth. Hello Defense in Breadth,” 2012.
https://devcentral.f5.com/weblogs/macvittie/archive/2012/01/27/f5-friday-goodbye-defense-in-depth.-hello-defense-in-breadth.aspx
|
[11]
|
R. Miller, “Advanced Persistent Threats: Defending from the Inside Out,” 2012.
http://www.ca.com/~/media/Files/whitepapers/advanced-persistent-threats-wp.pdf
|
[12]
|
A. W. Coviello, “Open Letter to RSA Customers,” 2011. http://www.eweek.com/c/a/Security/RSA-Will-Replace-SecurID-Tokens-in-Response-to-Lockheed-Martin-Attack-409915/
|
[13]
|
FireEye Inc., “Spear Phishing Attacks—Why They are Successful and How to Stop Them,” 2012.
http://www.fireeye.com/resources/pdfs/white-papers/fireeye-how-stop-spearphishing.pdf
|
[14]
|
FireEye, Inc., “Advanced Targeted Attacks: How to Protect Against the Next Generation of Cyber Attacks,” FireEye, Inc., Milpitas, 2012.
|
[15]
|
OWASP, “Defense in Depth,” 2012.
https://www.owasp.org/index.php/Defense_in_depth
|
[16]
|
Untangle Inc., “Web Content Control: Five Steps to a Successful Implementation,” 2012.
http://www.untangle.com/wp-content/uploads/pdf/FiveStepsToWebContentControl.pdf
|
[17]
|
W. Stallings and L. Brown, “Computer Security Principals and Practice,” Prentice Hall, Upper Saddle River, 2012.
|
[18]
|
U. Rivner, “Speaking of Security: Uri Rivner,” 2012.
http://blogs.rsa.com/author/rivner/
|
[19]
|
V. Hazlewood, “Defense-In-Depth: An Information Assurance Strategy for the Enterprise,” San Diego Supercomputer Center, La Jolla, 2006.
|
[20]
|
W. Odom, “CCNP ROUTE Official Certification Guide,” Cisco Press, Indianapolis, 2010.
|
[21]
|
G. Rajaratnam, S. Gnanasundaram and A. Shrivastava, “Information Storage and Management,” John Wiley & Sons, Inc., Indianapolis, 2012.
|