| Assessing Network Security |
| Chapter 3, Using Vulnerability Scanning to Assess Network Security |
| Chapter 23, Attachers Using Non-Network Methods to Gain Access |
| Chapter 24, Web Threats |
| Microsoft Windows Server 2003 PKI and Certificate Security |
| Chapter 2, Primer to PKI |
| Chapter 3, Policies and PKI |
| Chapter 9, Certificate Validation |