1. Stallings, W., & Brown, L. (2018). Computer Security: Principles and Practice (4th ed.). Pearson. In Chapter 8, "Firewalls and Intrusion Prevention Systems," the text describes network-level boundary protection. In Chapter 9, "Malicious Software," it details host-based (endpoint) countermeasures like antivirus, illustrating how network defenses block incoming attacks while endpoint defenses handle malware that reaches the host. This demonstrates the complementary relationship described in option D.
2. Kim, D., & Solomon, M. G. (2016). Fundamentals of Information Systems Security (3rd ed.). Jones & Bartlett Learning. Chapter 5, "Network Security," and Chapter 6, "Host Security," explicitly detail this layered approach. Network security (e.g., firewalls) is defined as protecting the network boundary, while host security (endpoint) is defined as protecting individual systems from threats that may have passed through the network, such as malware execution.
3. Carnegie Mellon University, Software Engineering Institute. (2007). Governing for Enterprise Security (GES) Executive Summary (CMU/SEI-2007-TN-020). p. 10. The document discusses a layered defense model, stating, "Perimeter defenses protect the network from the outside... Host-level security protects each individual computer." This directly supports the concept of network security blocking external traffic and endpoint security protecting the device itself.