Talk:Evolution of Operating Systems Designs/Networking: Security

Most of this information can be found in Counter Hack: A step by step guide to computer attacks and effective Defenses by Ed Skoudis Prentice Hall(2002) some aspects like packet filter technology can be found in Secure Architectures with Open BSD by Brandon Palmer and Jose Nazario, Addison Wesley 2004, or in Core Security Patterns: Best practices and Strategies for J2EE Web Services and Identity Management, by Christopher Steel, Ramesh Nagapan, Ray Lai; Pearson Education,(2006) I have a book on Intrusion Detection that I could quote from, but the title of the section didn't seem to encourage that type of application even though it is part of countering the network hacking problem it is not part of Distribution per se. I am not sure whether any of these books cover demilitarized zones a quick scan did not show the graphics I expected to explain them so I wonder if there wasn't another book that I read that I can't quote from because I no longer have it. However this information can be found in Wikipedia under DMZ(computing)--Graeme E. Smith (talk) 17:20, 27 April 2009 (UTC)