Up: Introduction to Internet Security
Previous: 10 Summary
-
- Brow 95
- Brown, Carol E., and Sangster, Alan, ``Electronic Sabotage'',
http://www.bus.orst.edu/faculty/brownc/lectures/virus/virus.htm, January 8, 1995.
- CERT 97
- Firth, Robert, et al, Detecting Signs of Intrusion,
http://www.sei.cmu.edu/pub/documents/sims/ps/sim001.ps,
Security Improvement Module CMU/SEI-SIM-001, August 1997.
- CERT 97
- Firth, Robert, et al, Security for a Public Web Site,
http://www.sei.cmu.edu/pub/documents/sims/ps/sim002.ps,
Security Improvement Module CMU/SEI-SIM-002, August 1997.
- CERT 98
- Allen, Julia, et al, Security for Information Technology Serviec Contracts,
http://www.sei.cmu.edu/pub/documents/sims/ps/sim003.ps,
Security Improvement Module CMU/SEI-SIM-003, January 1998.
- CERT 98
- Kochmar, John, et al, Preparing to Detect Signs of Intrusion,
http://www.sei.cmu.edu/pub/documents/sims/ps/sim005.ps,
Security Improvement Module CMU/SEI-SIM-005, August 1998.
- CERT 98
- The Official CERT Web Site,
http://www.cert.org, 1998.
- CERT 98
- CERT Incident Note IN-98.02,
http://www.cert.org/incident_notes/IN-98.02.html, July 2, 1998.
- Come 95
- Comer, Douglas E., Internetworking with TCP/IP Volume I:
Principles, Protocols, and Architecture, 3rd edition, Prentice Hall, 1995.
- Come 96
- Comer, Douglas E., Internetworking with TCP/IP Volume III,
Client-Server Programming and Applications for the BSD Socket Version, 2nd edition, Prentice Hall, 1996.
- Come 97
- Comer, Douglas E., The Internet Book: Everything
You Need to Know About Computer Networking and How the Internet Works, 2nd edition, Prentice
Hall, 1997.
- Come 98
- Comer, Douglas E., Internetworking with TCP/IP Volume II,
ANSI C Version: Design, Implementation, and Internals, 3rd edition, Prentice Hall, 1998.
- Ferg 98
- Ferguson, P. and D. Senie, ``Network Ingress Filtering:
Defeating Denial of Service Attacks Which Employ IP Source Address Spoofing'', Network Working
Group, RFC 2267, January 1998.
- Gard 98
- Gardner, Dana, ``E-mail Bug Stirs Up a Scare'', Infoworld,
pp 20, August 3, 1998.
- GNU 91
- The Official Linux Web site, http://www.fsf.org/copyleft/COPYING, 1991.
- Gram 84
- Grampp, Fred T. and Morris, Robert H. Morris, ``Unix
Operating System Security'', AT&T Bell Laboratories Technical Journal, Volume 63,
Number 8, Part 2, pp 1649-1672, October, 1984.
- Haen 96
- Haeni, Reto, ``An Introduction to Information Warfare'',
http://www.seas.gwu.edu/student/reto/infowar/info-war.html, August 23, 1996.
- INFO 98
- McClure, Sturat, ``E & Y Teaches the Fine Art of
Hacking at your Site'', Inforworld, pp 88, July 27, 1998.
- Kers 98
- Kerstetter, Jim, ``Human Side of Hacking'',
PC WEEK, pp 6, August 3, 1998.
- Linu 98
- The Official Web Site for the Linux Operating System, http://www.linux.org
1998.
- Morr 79
- Morris, Robert H., and Thompson, Ken, ``Unix Password Security'',
Communications of the ACM, Volume 22, Number 11, pp 594-597, November 1979.
- Mudg 97
- Mudge, Peter and Benjamin, Yobie, ``Deja Vu All Over Again'',
Byte Small Systems Journal, Vol. 22, No. 11, pp 81-86, November 1997.
- Negr 95
- Negroponte, Nicholas, Being Digital, Alfred
A. Knopf, 1995.
- Park 83
- Parker, Donn B., Fighting Computer Crime, Charles
Scribners' Sons, 1983.
- Shim 96
- Shimomura, Tsutomu with Markoff, John, Takedown,
Hyperion, 1996.
- Spaf 88
- Spafford, Eugene H., ``The Internet Worm Program: An
Analysis'', Purdue University Computer Science Department Technical Report CSD-TR-823, 1988.
- Spaf 89
- Spafford, Eugene H., ``The Internet Worm Incident'',
Proceedings of the 1989 European Software Engineering Conference (ESEC 89), Springer-Verlag,
Number 87, in Lecture Notes In Computer Science series, 1989.
- Stol 89
- Stoll, Clifford, The Cuckoo's Egg, Doubleday, 1989.
- Stol 95
- Stoll, Clifford, Silicon Snake Oil, Doubleday, 1995.
- Udel 97
- Udell, Jon, ``The Value of Free Software'', Byte
Small Systems Journal, Vol. 22, No. 12, pp 109-112, December 1997.
- Veri 98
- The Official VeriSign Web site, http://www.verisign.com/, 1998.
- Walk 98
- Walker, Christy and Moeller, Michael, ``E-Mail Full of Holes'',
PC Week, pp 8, August 3, 1998.
Up: Introduction to Internet Security
Previous: 10 Summary
2002-11-26