|
Атака через Internet
Литература
- Robert H'obbes' Zakon. Hobbes' Internet Timeline v2.5.
- Barry Leiner. A Brief History of the Internet.
- Gregory R. Gromov. The Roads and Crossroads of Internet's History,1996.
- Henry Edward Hardy. The History of the Net. Master's Thesis School of Communications
Grand Valley State University Allendale, MI, 1993.
- Vinton G. Cerf. The Internet Phenomenon.
- Gary Anthes. “Отец” Internet. Computer World. Москва, N 15, 1994. Computer
World.
- Morris R.T. A Weakness in the 4.2 BSD UNIX TCP/IP Software. Computing Science Technical
Report No. 117, AT&T Bell Laboratories, Murray Hill, New Jersey, 1985.
- Dan Farmer. Shall We Dust Moscow? 18 December 1996.
- Теория и практика обеспечения информационной
безопасности, под редакцией Зегжды П.Д., Изд.
“Яхтсмен”, 1996.
- Гайкович В., Першин А.. Безопасность электронных
банковских систем., Изд. “Единая Европа”, 1994.
- Ростовцев А. Г. Элементы Криптологии, Изд. СПбГТУ
- Клименко С., Уразметов В., Internet. Среда обитания
информационного общества, Российский Центр
Физико-Технической Информатики, 1995.
- U.S. Office of Technology Assessment “Information security and privacy in network
environments.”
- Bellovin S. Security Problems in the TCP/IP Protocol Suite.
- Larry Lange. 'Hack' punches hole in Microsoft NT security. EE Times, 31.03.97.
- Dan Farmer, Wietse Venema. Improving the Security of Your Site by Breaking Into it.
- Клиффорд Столл. Яйцо кукушки.
- Mark W. Eichin, Jon A. Rochils. With Microscope and Tweezers: An Analysis of the
Internet Virus of November 1988.
- Eugene H. Spafford. The Internet Worm Program: An Analysis.
- CIAC information bulletin H-07: Sendmail SIGHUP-smtpd Vulnerability.
- CIAC information bulletin H-23: Sendmail MIME Conversion Buffer Overrun Vulnerability.
- CIAC information bulletin H-34: Vulnerability in innd.
- Carl E. Landwehr, Alan R. Bull, John P. McDermott, and William S.Choi. A Taxonomy of
Computer Security Flaws, with Examples. Information Technology Division, Code 5542, Naval
Research Laboratory, Washington, D.C. 20375-5337.
- Barton P. Miller и др. Fuzz Revisited: A Re-examination of the Reability of UNIX
Utilities and Services.
- Christopher Klaus. A Guide to Internet Security: Becoming an Uebercracker and Becoming
an UeberAdmin to stop Uebercrackers.
- CIAC information bulletin E-17: FTP Daemon Vulnerabilities.
- Bell Labs Computer Science Technical Report #117, February 25, 1985.
- F. B. Cohen Packet Fragmentation Attacks.
- Ping Death. http://www.sophist.demon.co.uk/ping.
[Оглавление] |
|