desktop security software  
security desktop order software software library technical support

security desktop

Home

Desktop Security

Internet Security

PC Time Limit

Protect Files

Security FAQ

Windows Tips

Internet FAQ

 

limit, kids, pc, time, security, desktop, child, online, limits, password, control, user, restrict, access, protect, privacy, internet, children

 

 

 

Bibliography

Caelli, W., Longley, D., and Shain, M., Information Security Handbook, Stockton Press, New York, 1991.

Chapman, D. B., and Zwicky, E. D. Building Internet Firewalls, O'Reilly & Associates, Sebastopol, CA, 1995.

Cheswick, W. R., and Bellovin, S. M., Firewalls and Internet Security: Repelling the Wily Hacker, Addison-Wesley, New York, 1994.

Comer, D. E., Internetworking with TCP/IP, 3 vols., Prentice-Hall, Englewood Cliffs, NJ, 1991 and 1993.

Garfinkel, S., PGP: Pretty Good Privacy, O'Reilly & Associates, Sebastopol, CA, 1995.

Garfinkel, S., and Spafford, G., Practical UNIX and Internet Security, 2d ed., O'Reilly & Associates., Sebastopol, CA, 1996.

Kaufman, C., Perlman, R., and Speciner, M., Network Security: Private Communication in a Public World, PTR Prentice-Hall, Englewood Cliffs, NJ, 1995.

McGraw, G., and Felten, E. W., Java Security, John Wiley & Sons, New York, 1996.

National Research Council, Computers at Risk: Safe Computing in the Information Age, National Academy Press, Washington, D. C., 1991.

Schneier, B., Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2d ed., John Wiley & Sons, New York, 1996.

Internet FAQ top
 

l Security Officer l Internet Explorer Security l Protect Files l User Time Control l Security Desktop l Site Map

Copyrights 2006 Eugene Mihailov. All rights reserved