Назад в раздел
Библиография
Библиография
- [Avol94] Frederick Avolio and Marcus Ranum. A Network
Perimeter With Secure Internet Access. In Internet
Society Symposium on Network and Distributed System
Security, pages 109-119. Internet Society, February 2-4
1994.
- [Bel89] Steven M. Bellovin. Security Problems in the
TCP/IP Protocol Suite. Computer Communications Review,
9(2):32-48, April 1989.
- [Cerf93] Vinton Cerf. A National Information
Infrastructure. Connexions, June 1993.
- [CERT94] Computer Emergency Response Team/Coordination
Center. CA-94:01, Ongoing Network Monitoring Attacks.
Available from FIRST.ORG, pub/alerts/cert9401.txt,
February 1994.
- [Chap92] D. Brent Chapman. Network (In)Security Through
IP Packet Filtering. In USENIX Security Symposium III
Proceedings, pages 63-76. USENIX Association, September
14-16 1992.
- [Ches94] William R. Cheswick and Steven M. Bellovin.
Firewalls and Internet Security. Addison-Wesley, Reading,
MA, 1994.
- [CIAC94a] Computer Incident Advisory Capability. Number
e-07, unix sendmail vulnerabilities update. Available
from FIRST.ORG, file pub/alerts/e-07.txt, January 1994.
- [CIAC94b] Computer Incident Advisory Capability. Number
e-09, network monitoring attacks. Available from
FIRST.ORG, pub/alerts/e-09.txt, February 1994.
- [CIAC94c] Computer Incident Advisory Capability. Number
e-14, wuarchive ftpd trojan horse. Available from
FIRST.ORG, pub/alerts/e-14.txt, February 1994.
- [Com91a] Douglas E. Comer. Internetworking with TCP/IP:
Principles, Protocols, and Architecture. Prentice-Hall,
Englewood Cliffs, NJ, 1991.
- [Com91b] Douglas E. Comer and David L. Stevens.
Internetworking with TCP/IP:Design, Implementation, and
Internals. Prentice-Hall, Englewood Cliffs, NJ, 1991.
- [Cur92] David Curry. UNIX System Security: A Guide for
Users and System Administrators. Addison-Wesley, Reading,
MA, 1992.
- [Farm93] Dan Farmer and Wietse Venema. Improving the
security ofyour site by breaking into it. Available from
FTP.WIN.TUE.NL, file
/pub/security/admin-guide-to-cracking.101.Z, 1993.
- [Ford94] Warwick Ford. Computer Communications Security.
Prentice-Hall, Englewood Cliffs, NJ, 1994.
- [Garf92] Simpson Garfinkel and Gene Spafford. Practical
UNIX Security. O'Reilly and Associates, Inc., Sebastopol,
CA, 1992.
- [Haf91] Katie Hafner and John Markoff. Cyberpunk: Outlaws
and Hackers on the Computer Frontier. Simon and Schuster,
New York, 1991.
- [Hunt92] Craig Hunt. TCP/IP Network Administration.
O'Reilly and Associates, Inc., Sebastopol, CA, 1992.
- [NIST91a] NIST. Advanced Authentication Technology. CSL
Bulletin, National Institute of Standards and Technology,
November 1991.
- [NIST91b] NIST. Establishing a Computer Security Incident
Response Capability. Special Publication 800-3, National
Institute of Standards and Technology, January 1991.
- [NIST93] NIST. Connecting to the Internet: Security
Considerations. CSL Bulletin, National Institute of
Standards and Technology, July 1993.
- [NIST94a] NIST. Guideline for the use of Advanced
Authentication Technology Alternatives. Federal
Information Processing Standard 190, National Institute
of Standards and Technology, September 1994.
- [NIST94b] NIST. Reducing the Risk of Internet Connection
and Use. CSL Bulletin, National Institute of Standards
and Technology, May 1994.
- [NIST94c] NIST. Security in Open Systems. Special
Publication 800-7, National Institute of Standards and
Technology, September 1994.
- [Ran93] Marcus Ranum. Thinking About Firewalls. In
SANS-II Conference, April 1993.
- [RFC1244] Paul Holbrook and Joyce Reynolds. RFC 1244:
Security Policy Handbook. prepared for the Internet
Engineering Task Force, 1991.
Назад | Содержание | Вперед
|
|
|
|