Атака через Internet

Литература

Литература

  1. Robert H'obbes' Zakon. Hobbes' Internet Timeline v2.5.
  2. Barry Leiner. A Brief History of the Internet.
  3. Gregory R. Gromov. The Roads and Crossroads of Internet's History,1996.
  4. Henry Edward Hardy. The History of the Net. Master's Thesis School of Communications Grand Valley State University Allendale, MI, 1993.
  5. Vinton G. Cerf. The Internet Phenomenon.
  6. Gary Anthes. ⌠Отец■ Internet. Computer World. Москва, N 15, 1994. Computer World.
  7. Morris R.T. A Weakness in the 4.2 BSD UNIX TCP/IP Software. Computing Science Technical Report No. 117, AT&T Bell Laboratories, Murray Hill, New Jersey, 1985.
  8. Dan Farmer. Shall We Dust Moscow? 18 December 1996.
  9. Теория и практика обеспечения информационной безопасности, под редакцией Зегжды П.Д., Изд. ⌠Яхтсмен■, 1996.
  10. Гайкович В., Першин А.. Безопасность электронных банковских систем., Изд. ⌠Единая Европа■, 1994.
  11. Ростовцев А. Г. Элементы Криптологии, Изд. СПбГТУ
  12. Клименко С., Уразметов В., Internet. Среда обитания информационного общества, Российский Центр Физико-Технической Информатики, 1995.
  13. U.S. Office of Technology Assessment ⌠Information security and privacy in network environments.■
  14. Bellovin S. Security Problems in the TCP/IP Protocol Suite.
  15. Larry Lange. 'Hack' punches hole in Microsoft NT security. EE Times, 31.03.97.
  16. Dan Farmer, Wietse Venema. Improving the Security of Your Site by Breaking Into it.
  17. Клиффорд Столл. Яйцо кукушки.
  18. Mark W. Eichin, Jon A. Rochils. With Microscope and Tweezers: An Analysis of the Internet Virus of November 1988.
  19. Eugene H. Spafford. The Internet Worm Program: An Analysis.
  20. CIAC information bulletin H-07: Sendmail SIGHUP-smtpd Vulnerability.
  21. CIAC information bulletin H-23: Sendmail MIME Conversion Buffer Overrun Vulnerability.
  22. CIAC information bulletin H-34: Vulnerability in innd.
  23. Carl E. Landwehr, Alan R. Bull, John P. McDermott, and William S.Choi. A Taxonomy of Computer Security Flaws, with Examples. Information Technology Division, Code 5542, Naval Research Laboratory, Washington, D.C. 20375-5337.
  24. Barton P. Miller и др. Fuzz Revisited: A Re-examination of the Reability of UNIX Utilities and Services.
  25. Christopher Klaus. A Guide to Internet Security: Becoming an Uebercracker and Becoming an UeberAdmin to stop Uebercrackers.
  26. CIAC information bulletin E-17: FTP Daemon Vulnerabilities.
  27. Bell Labs Computer Science Technical Report #117, February 25, 1985.
  28. F. B. Cohen Packet Fragmentation Attacks.
  29. Ping Death. http://www.sophist.demon.co.uk/ping.


<<< ^^^ >>>


Наш баннер
Вы можете установить наш баннер на своем сайте или блоге, скопировав этот код:
RSS новости