WatchGuard x1000 Guide De Référence
![WatchGuard](https://files.manualsbrain.com/attachments/08fb3bde1af3a93ee3e20727e45c03b88b6a6216/common/fit/150/50/6951d18637763e500e358da5748482d77ff6621b16fc3d6b6f7e74745337/brand_logo.png)
White Papers & Requests for Comments
Reference Guide
83
Schneier, Bruce. Applied Cryptography. Second Edition. New York: John
Wiley & Sons, Inc., 1996. ISBN 0-471-11709-9.
Wiley & Sons, Inc., 1996. ISBN 0-471-11709-9.
Schwartau, Winn. Cybershock: Surviving Hacker, Phreakers, Identity Theives,
Internet Terrorists and Weapons of Mass Disruption. New York: Thunder’s
Mouth Press, 2000. ISBN 1-56025-246-4.
Internet Terrorists and Weapons of Mass Disruption. New York: Thunder’s
Mouth Press, 2000. ISBN 1-56025-246-4.
Sheldon, Tom (Editor); Cox, Phil. Windows 2000 Security Handbook.
McGraw-Hill Publishing, November 2000. ISBN 0072124334.
McGraw-Hill Publishing, November 2000. ISBN 0072124334.
Stevens, W. Richard. TCP/IP Illustrated. Reading MA: Addison Wesley
Longman, Inc., 1994. ISBN 0201633469. (Note: This is a 3-volume set.)
Longman, Inc., 1994. ISBN 0201633469. (Note: This is a 3-volume set.)
Stoll, Cliff. Cuckoo’s Egg. Pocket Books, 1995. ISBN 0671726889.
Vacca, John, Intranet Security. Rockland, MA: Charles River Media, Inc.,
1997. ISBN 1-886801-56-8.
1997. ISBN 1-886801-56-8.
Fiction
Stephenson, Neal. Cryptonomicon. New York, NY: HarperCollins
Publishers, 1999. ISBN 0060512806.
Publishers, 1999. ISBN 0060512806.
White Papers & Requests for Comments
Reynolds, J. and J. Postel, Assigned Numbers. Available at this Web site:
Request for Comments Editor
Internet Request for Comments (RFC)