Here are a few suggestions for resources with more information about network security.
Bellovin, S. M., and M. Merritt. “Encrypted Key Exchange: Password-Based Protocols Secure Against Dictionary Attacks.” In Proceedings of the 1992 IEEE Computer Society Conference on Research in Security and Privacy (1992): 72-84
Bellovin, S. M., and M. Merritt. “Limitations of the Kerberos Protocol.” Winter 1991 USENIX Conference Proceedings (1991): 253-267
Davies, D. W., and W. L. Price. “The Application of Digital Signatures Based on Public-Key Cryptosystems.” Proceedings of the Fifth International Computer Communications Conference (Oct 1980): 525-530.
Davies, D. W., and W. L. Price. Security for Computer Networks, 2d ed. New York: John Wiley & Sons, 1989.
Davies, D. W., and W. L. Price. “Digital Signatures — An Update.” From Proceedings of International Computer Communications, Oct. 1984. Sydney, Australia. North Holland: Elsevier Science Publishers, (1985): 843-847.
Denning, D. E., and C. M. Sacco. “Timestamps in Key Distribution Protocols.” Communications of the ACM, v.24, n. 8. (Aug 1981): 533-536.
Jin, T. Care and Feeding of Your Three-Headed Dog. Document Number IAG-90-11. Hewlett-Packard Corporation (May 1990).
Jin, T. Living with Your Three-Headed Dog. Document Number LAG-90-012. Hewlett-Packard Corporation (May 1990).
Kohl, J. T. “The Evolution of the Kerberos Authentication Service.” From the EuroOpen Conference Proceedings. (May 1991): 295-313
Needham, R. M., and M. D. Schroeder, “Using Encryption for Authentication in Large Networks of Computers.” In Communications of the ACM, v.21, no. 1. (Dec 1978): 993-999
B. Schneier, Applied Cryptography: Protocols, Algorithms, and Source Code in C. John Wiley & Sons, Inc. 1994.
Sjogren, S. “A Bite Out of LAN Crime ” In INTEROPERABILITY. (Spring 1991). Supplement to LAN Magazine.
Steiner, J. G., and B. C. Neauman, J. I. Schiller, and J. H. Saltzer, “Kerberos, An Authentication Service for Open Network Systems.” From USENIX Conference Proceedings. (Feb 1989): 91-202
Russell, D., and G.T. Gangemi Sr., Computer Security Basics, O'Reilly & Associates, Inc., 1992.