next up previous
Up: Introduction to Internet Security Previous: 10 Summary

Bibliography

Brow 95
Brown, Carol E., and Sangster, Alan, ``Electronic Sabotage'', http://www.bus.orst.edu/faculty/brownc/lectures/virus/virus.htm, January 8, 1995.

CERT 97
Firth, Robert, et al, Detecting Signs of Intrusion, http://www.sei.cmu.edu/pub/documents/sims/ps/sim001.ps, Security Improvement Module CMU/SEI-SIM-001, August 1997.

CERT 97
Firth, Robert, et al, Security for a Public Web Site, http://www.sei.cmu.edu/pub/documents/sims/ps/sim002.ps, Security Improvement Module CMU/SEI-SIM-002, August 1997.

CERT 98
Allen, Julia, et al, Security for Information Technology Serviec Contracts, http://www.sei.cmu.edu/pub/documents/sims/ps/sim003.ps, Security Improvement Module CMU/SEI-SIM-003, January 1998.

CERT 98
Kochmar, John, et al, Preparing to Detect Signs of Intrusion, http://www.sei.cmu.edu/pub/documents/sims/ps/sim005.ps, Security Improvement Module CMU/SEI-SIM-005, August 1998.

CERT 98
The Official CERT Web Site, http://www.cert.org, 1998.

CERT 98
CERT Incident Note IN-98.02, http://www.cert.org/incident_notes/IN-98.02.html, July 2, 1998.

Come 95
Comer, Douglas E., Internetworking with TCP/IP Volume I: Principles, Protocols, and Architecture, 3rd edition, Prentice Hall, 1995.

Come 96
Comer, Douglas E., Internetworking with TCP/IP Volume III, Client-Server Programming and Applications for the BSD Socket Version, 2nd edition, Prentice Hall, 1996.

Come 97
Comer, Douglas E., The Internet Book: Everything You Need to Know About Computer Networking and How the Internet Works, 2nd edition, Prentice Hall, 1997.

Come 98
Comer, Douglas E., Internetworking with TCP/IP Volume II, ANSI C Version: Design, Implementation, and Internals, 3rd edition, Prentice Hall, 1998.

Ferg 98
Ferguson, P. and D. Senie, ``Network Ingress Filtering: Defeating Denial of Service Attacks Which Employ IP Source Address Spoofing'', Network Working Group, RFC 2267, January 1998.

Gard 98
Gardner, Dana, ``E-mail Bug Stirs Up a Scare'', Infoworld, pp 20, August 3, 1998.

GNU 91
The Official Linux Web site, http://www.fsf.org/copyleft/COPYING, 1991.

Gram 84
Grampp, Fred T. and Morris, Robert H. Morris, ``Unix Operating System Security'', AT&T Bell Laboratories Technical Journal, Volume 63, Number 8, Part 2, pp 1649-1672, October, 1984.

Haen 96
Haeni, Reto, ``An Introduction to Information Warfare'', http://www.seas.gwu.edu/student/reto/infowar/info-war.html, August 23, 1996.

INFO 98
McClure, Sturat, ``E & Y Teaches the Fine Art of Hacking at your Site'', Inforworld, pp 88, July 27, 1998.

Kers 98
Kerstetter, Jim, ``Human Side of Hacking'', PC WEEK, pp 6, August 3, 1998.

Linu 98
The Official Web Site for the Linux Operating System, http://www.linux.org 1998.

Morr 79
Morris, Robert H., and Thompson, Ken, ``Unix Password Security'', Communications of the ACM, Volume 22, Number 11, pp 594-597, November 1979.

Mudg 97
Mudge, Peter and Benjamin, Yobie, ``Deja Vu All Over Again'', Byte Small Systems Journal, Vol. 22, No. 11, pp 81-86, November 1997.

Negr 95
Negroponte, Nicholas, Being Digital, Alfred A. Knopf, 1995.

Park 83
Parker, Donn B., Fighting Computer Crime, Charles Scribners' Sons, 1983.

Shim 96
Shimomura, Tsutomu with Markoff, John, Takedown, Hyperion, 1996.

Spaf 88
Spafford, Eugene H., ``The Internet Worm Program: An Analysis'', Purdue University Computer Science Department Technical Report CSD-TR-823, 1988.

Spaf 89
Spafford, Eugene H., ``The Internet Worm Incident'', Proceedings of the 1989 European Software Engineering Conference (ESEC 89), Springer-Verlag, Number 87, in Lecture Notes In Computer Science series, 1989.

Stol 89
Stoll, Clifford, The Cuckoo's Egg, Doubleday, 1989.

Stol 95
Stoll, Clifford, Silicon Snake Oil, Doubleday, 1995.

Udel 97
Udell, Jon, ``The Value of Free Software'', Byte Small Systems Journal, Vol. 22, No. 12, pp 109-112, December 1997.

Veri 98
The Official VeriSign Web site, http://www.verisign.com/, 1998.

Walk 98
Walker, Christy and Moeller, Michael, ``E-Mail Full of Holes'', PC Week, pp 8, August 3, 1998.


next up previous
Up: Introduction to Internet Security Previous: 10 Summary
2002-11-26