References
Next: On-Line Sources for
Up: No Title
Previous: Incident Handling Contacts
References
- Avol94
-
Frederick Avolio and Marcus Ranum.
A Network Perimeter With Secure Internet Access.
In Internet Society Symposium on Network and Distributed System
Security, pages 109-119. Internet Society, February 2-4 1994.
- Bel89
-
Steven M. Bellovin.
Security Problems in the TCP/IP Protocol Suite.
Computer Communications Review, 9(2):32-48, April 1989.
- Cerf93
-
Vinton Cerf.
A National Information Infrastructure.
Connexions, June 1993.
- CERT94
-
Computer Emergency Response Team/Coordination Center.
CA-94:01, Ongoing Network Monitoring Attacks.
Available from FIRST.ORG, file pub/alerts/cert9401.txt, February
1994.
- Chap92
-
D. Brent Chapman.
Network (In)Security Through IP Packet Filtering.
In USENIX Security Symposium III Proceedings, pages 63-76.
USENIX Association, September 14-16 1992.
- Ches94
-
William R. Cheswick and Steven M. Bellovin.
Firewalls and Internet Security.
Addison-Wesley, Reading, MA, 1994.
- CIAC94a
-
Computer Incident Advisory Capability.
Number e-07, unix sendmail vulnerabilities update.
Available from FIRST.ORG, file pub/alerts/e-07.txt, January 1994.
- CIAC94b
-
Computer Incident Advisory Capability.
Number e-09, network monitoring attacks.
Available from FIRST.ORG, file pub/alerts/e-09.txt, February 1994.
- CIAC94c
-
Computer Incident Advisory Capability.
Number e-14, wuarchive ftpd trojan horse.
Available from FIRST.ORG, file pub/alerts/e-14.txt, February 1994.
- Com91a
-
Douglas E. Comer.
Internetworking with TCP/IP: Principles, Protocols,
and Architecture.
Prentice-Hall, Englewood Cliffs, NJ, 1991.
- Com91b
-
Douglas E. Comer and David L. Stevens.
Internetworking with TCP/IP: Design, Implementation,
and Internals.
Prentice-Hall, Englewood Cliffs, NJ, 1991.
- Cur92
-
David Curry.
UNIX System Security: A Guide for Users and
System Administrators.
Addison-Wesley, Reading, MA, 1992.
- Farm93
-
Dan Farmer and Wietse Venema.
Improving the security of your site by breaking into it.
Available from FTP.WIN.TUE.NL, file
/pub/security/admin-guide-to-cracking.101.Z, 1993.
- Ford94
-
Warwick Ford.
Computer Communications Security.
Prentice-Hall, Englewood Cliffs, NJ, 1994.
- Garf92
-
Simpson Garfinkel and Gene Spafford.
Practical UNIX Security.
O'Reilly and Associates, Inc., Sebastopol, CA, 1992.
- Haf91
-
Katie Hafner and John Markoff.
Cyberpunk: Outlaws and Hackers on the Computer
Frontier.
Simon and Schuster, New York, 1991.
- Hunt92
-
Craig Hunt.
TCP/IP Network Administration.
O'Reilly and Associates, Inc., Sebastopol, CA, 1992.
- NIST91a
-
NIST.
Advanced Authentication Technology.
CSL Bulletin, National Institute of Standards and Technology,
November 1991.
- NIST91b
-
NIST.
Establishing a Computer Security Incident Response
Capability.
Special Publication 800-3, National Institute of Standards and
Technology, January 1991.
- NIST93
-
NIST.
Connecting to the Internet: Security Considerations.
CSL Bulletin, National Institute of Standards and Technology,
July 1993.
- NIST94a
-
NIST.
Guideline for the use of Advanced Authentication Technology Alternatives.
Federal Information Processing Standard 190, National Institute of
Standards and Technology, September 1994.
- NIST94b
-
NIST.
Reducing the Risk of Internet Connection and Use.
CSL Bulletin, National Institute of Standards and Technology, May
1994.
- NIST94c
-
NIST.
Security in Open Systems.
Special Publication 800-7, National Institute of Standards and
Technology, September 1994.
- Ran93
-
Marcus Ranum.
Thinking About Firewalls.
In SANS-II Conference, April 1993.
- RFC1244
-
Paul Holbrook and Joyce Reynolds.
RFC 1244: Security Policy Handbook.
prepared for the Internet Engineering Task Force, 1991.
John Wack
Thu Feb 9 18:17:09 EST 1995