Referências: |
ALLEN, Julia H et al. Software security engineering: a guide for project managers. Upper Saddle River, EUA: Addison-Wesley, 2008. 334 p. (The SEI series in software engineering / The Addison-Wesley software security series.).
JONES, Keith J; BEJTLICH, Richard; ROSE, Curtis W. Real digital forensics: computer security and incident response. Upper Saddle River, NJ: Addison Wesley, 2006. 650 p.
STEVENS, W. Richard; FENNER, Bill; RUDOFF, Andrew M. UNIX network programming: the sockets networking API. 3ª. ed. Boston, MA: Addison-Wesley, 2004. v. 1. 991 p. (Addison-Wesley professional computing series). DAVIS, Ken; TURNER, John W.; YOCOM, Nathan. The definitive guide to linux network programming. Berkeley; Apress, 2004 375 p.
NAKAMURA, Emilio Tissato; GEUS, Paulo Lício de. Segurança de redes em ambiente cooperativos. São Paulo: Novatec Editora, 2007. 482 p.
RAVAL, Vasant H; FICHADIA, Ashok. Risks, controls, and security: concepts and applications. Hoboken, EUA: Wiley, 2007. 403 p.
STEVENS, W. Richard; FENNER, Bill; RUDOFF, Andrew M. UNIX network programming: the sockets networking API. 3ª. ed. Boston, MA: Addison-Wesley, c2004. v. 1. 991 p. (Addison-Wesley professional computing series). |