User guide

White Papers & Requests for Comments
Reference Guide 103
Schneier, Bruce. Applied Cryptography. Second Edition. New York: John
Wiley & Sons, Inc., 1996. ISBN 0-471-11709-9.
Schwartau, Winn. Cybershock: Surviving Hacker, Phreakers, Identity Theives,
Internet Terrorists and Weapons of Mass Disruption. New York: Thunder’s
Mouth Press, 2000. ISBN 1-56025-246-4.
Sheldon, Tom (Editor); Cox, Phil. Windows 2000 Security Handbook.
McGraw-Hill Publishing, November 2000. ISBN 0072124334.
Stevens, W. Richard. TCP/IP Illustrated. Reading MA: Addison Wesley
Longman, Inc., 1994. ISBN 0201633469. (Note: This is a 3-volume set.)
Vacca, John, Intranet Security. Rockland, MA: Charles River Media, Inc.,
1997. ISBN 1-886801-56-8.
Fiction
Stoll, Cliff. Cuckoo’s Egg. Pocket Books, 1995. ISBN 0671726889.
White Papers & Requests for Comments
Reynolds, J. and J. Postel, Assigned Numbers. Available at this Web site:
http://www.cis.ohio-state.edu/htbin/rfc/rfc1700.html
Request for Comments Editor
http://www.rfc-editor.org
Internet Request for Comments (RFC)
http://www.cis.ohio-state.edu/hypertext/information/rfc.html
Mailing Lists
wg-users@watchguard.com
WatchGuard sponsors a listserv for our customers. For more
information, see the Technical Support chapter in the User Guide.
firewall-wizards@nfr.net