- Age85
 - 
National Security Agency.
Magnetic Tape Degausser.
Technical Report L14-4-A, National Security Agency/Central Security
  Service, Octubre 1985.
 - AK96
 - 
Ross J. Anderson and Markus Kuhn.
Tamper resistance - a cautionary note.
In Proceedings of the 2nd USENIX Workshop on Electronic
  Commerce, pages 1-11. The USENIX Association, Noviembre 1996.
 - AKS96
 - 
Taimur Aslam, Ivan Krsul, and Eugene H. Spafford.
Use of a taxonomy of security faults.
Technical Report TR-96-051, Purdue University Department of Computer
  Science, 1996.
 - ALGJ98
 - 
Stefan Axelsson, Ulf Lindqvist, Ulf Gustafson, and Erland Jonsson.
An approach to Unix Security Logging.
In Proceedings of the 21st National Information Systems Security
  Conference, pages 62-75. National Institute of Standards and
  Technology/National Computer Security Center, Octubre 1998.
 - And80
 - 
James P. Anderson.
Computer security threat monitoring and surveillance.
Technical report, James P. Anderson Co., Abril 1980.
 - And94
 - 
Ross J. Anderson.
Why Cryptosystems Fail.
Communications of the ACM, 37:32-40, Noviembre 1994.
 - And97
 - 
Ross J. Anderson.
Tamperproofing of Chip Cards.
Enviado a la lista cypherpunks@cyberpass.net por William H.
  Geiger III en septiembre, 1997.
 - Ano97
 - 
Anonymous.
Maximum Security: a hacker´s guide to protecting your
  Internet site and network.
McMillan Computer Publishing, 1997.
 - Ano01
 - 
Anonymous.
Maximum Linux Security: a hacker´s guide to protecting
  your Linux Server and Workstation.
Sams Publishing, 2001.
 - ANS98
 - 
R. J. Anderson, R. M. Needham, and A. Shamir.
The Steganographic File System.
Lecture Notes in Computer Science, 1525:73-82, 1998.
 - Ark99
 - 
Ofir Arkin.
Network Scanning Techniques, Noviembre 1999.
PubliCom Communications Solutions.
 - Atk93
 - 
Derek A. Atkins.
Charon: Kerberos Extensions for Authentication over Secondary
  Networks.
PhD thesis, Department of Electrical Engineering and Computer
  Science, Massachusetts Institute of Technology, 1993.
 - Axe98
 - 
Stefan Axelsson.
Research in intrusion-detection systems: A survey.
Technical Report 98-17, Chalmers University of Technology, Diciembre
  1998.
 - B$^+$85
 - 
Sheila L. Brand et al.
Department of Defense Trusted Computer System Evaluation
  Criteria.
Technical Report DOD 5200.28-STD, Department of Defense, Diciembre
  1985.
 - B$^+$88
 - 
Sue Berg et al.
Glossary of Computer Security Terms.
Technical Report NCSC-TG-004, National Computer Security Center,
  Octubre 1988.
 - Bac86
 - 
Maurice J. Bach.
The Design of the Unix Operating System.
Prentice Hall, 1986.
 - Bai97
 - 
Edward C. Bailey.
Maximum RPM: Taking the Red Hat Package Manager
  to the limit.
Red Hat Software, Inc., 1997.
 - BAW96
 - 
F. Bouchier, J.S. Ahrens, and G. Wells.
Laboratory evaluation of the IriScan prototype biometric
  identifier.
Technical Report SAND96-1033, Sandia National Laboratories, Abril
  1996.
 - BB99
 - 
Roland Büschkes and Mark Borning.
Transaction-based Anomaly Detection.
In Proceedings of Workshop on Intrusion Detection and Network
  Monitoring. The USENIX Association, Abril 1999.
 - BBD$^+$96
 - 
Michael Beck, Harold Bohme, Mirko Dzladzka, Ulrich Kunitz, Robert Magnus, and
  Dirk Verworner.
Linux Kernel Internals.
Addison-Wesley, 1996.
 - BCOW94
 - 
John Barkley, Lisa Carnahan, Karen Olsen, and John Wack.
Improving security in a network environment.
In John Barkley, editor, Security in Open Systems,
  chapter 10. National Institute of Standards and Technology (NIST),
  Julio 1994.
Special Publication 800-7.
 - BD96
 - 
Matt Bishop and Michael Dilger.
Checking for race conditions in file accesses.
Computing System, 9(2):131-152, Primavera 1996.
 - Bel89
 - 
Steven M. Bellovin.
Security problems in the TCP/IP Protocol Suite.
Computer Communications Review, 19(2):32-48, Abril 1989.
 - Bel92
 - 
Steven M. Bellovin.
There be dragons.
In Proceedings of the Third USENIX Security Symposium,
  pages 1-16. The USENIX Association, Septiembre 1992.
 - Bel93a
 - 
Walter Belgers.
Unix password security, 1993.
 - Bel93b
 - 
Steven M. Bellovin.
Packets found on an internet.
Computer Communications Review, 23(3):26-31, Julio 1993.
 - Bel96
 - 
Steven M. Bellovin.
RFC1498: Defending against sequence number attacks, Mayo 1996.
 - BF99
 - 
Dirk Balfanz and Edward W. Felten.
Hand-held computers can be better smart cards.
In Proceedings of the 8th USENIX Security Symposium. The
  USENIX Association, Agosto 1999.
 - BGML96
 - 
W. Bender, D. Gruhl, N. Morimoto, and A. Lu.
Techniques for data hiding.
IBM Systems Journal, 35(3,4), 1996.
 - Bha01
 - 
Nishchal Bhalla.
AIX 4.3 bastion host guidelines, Junio 2001.
The SANS Institute.
 - Bis86
 - 
Matt Bishop.
How to write a setuid program.
;login:, 12(1), Enero 1986.
 - Bis90
 - 
Matt Bishop.
A Security Analysis of the NTP Protocol, 1990.
 - Bis91
 - 
Matt Bishop.
A proactive password checker.
In D.T. Lindsay and W.L. Price, editors, Proceedings of the 7th
  International Conference on Information Security, pages 150-158, Mayo 1991.
 - Bis92
 - 
Matt Bishop.
Anatomy of a proactive password changer.
In Proceedings of USENIX Unix Security III. The USENIX Association, 1992.
 - Bis95
 - 
Matt Bishop.
Race conditions, files and security flaws; or the tortoise and the
  hare redux.
Technical Report CSE-95-8, University of California at Davis, 1995.
 - BK95
 - 
Matt Bishop and Daniel V. Klein.
Improving system security via proactive password checking.
Computers & Security, 14(3):233-249, 1995.
 - Bla93
 - 
Matt Blaze.
A Cryptographic File System for Unix.
In Proceedings of the 1st ACM Conference on Computer and
  Communications Security, pages 9-16. ACM, Noviembre 1993.
 - BM91
 - 
Steven M. Bellovin and Michael Merritt.
Limitations of the Kerberos Authentication System.
In Proceedings of the Winter 1991 USENIX Conference,
  pages 253-267. The USENIX Association, Enero 1991.
 - BPB00
 - 
Bill Ball, David Pitts, and William Ball.
Red Hat Linux 7 Unleashed.
Sams Publishing, 2000.
 - C$^+$91
 - 
Dave Curry et al.
RFC1244: Site Security Handbook.
Internet Activities Board, Julio 1991.
 - C$^+$98
 - 
Crispin Cowan et al.
StackGuard: automatic adaptative detection and prevention of
  buffer-overflow attacks.
In Proceedings of the 7th USENIX Security Symposium. The
  USENIX Association, Enero 1998.
 - CA97a
 - 
Bryan Costales and Eric Allman.
Sendmail.
O´Reilly & Associates, 2nd edition, Enero 1997.
 - CA97b
 - 
Bryan Costales and Eric Allman.
Sendmail Desktop Reference.
O´Reilly & Associates, Marzo 1997.
 - Cab96
 - 
Pino Caballero.
Introducción a la Criptografía.
Ra-Ma, 1996.
 - Caj82
 - 
Valentin Sanz Caja.
Vulnerabilidad y seguridad de los sistemas informáticos.
Fundación Citema, 1982.
 - CB94
 - 
William R. Cheswick and Steven M. Bellovin.
Firewalls and Internet Security: Repelling the wily hacker.
Addison Wesley, 1994.
 - CC86
 - 
D.B. Cornish and R. V. Clarke.
The Reasoning Criminal: Rational Choice Perspectives on
  Offending.
Springer-Verlag, 1986.
 - CDK94
 - 
G.F. Couloris, J. Dollimore, and T. Kindberg.
Distributed Systems. Concepts and design.
Addison Wesley, 2nd edition, 1994.
 - CDM97
 - 
Rémy Card, Eric Dumas, and Frack Mével.
Programación Linux 2.0: API de sistema y funcionamiento del
  núcleo.
Eyrolles, 1997.
 - Cen91
 - 
National Computer Security Center.
Data Remanence in Automated Information Systems.
Technical Report NCSC-TG-025, National Computer Security Center,
  Septiembre 1991.
 - CER99
 - 
CERT.
CERT Advisory CA-99-02. Trojan Horses.
Technical report, Computer Emergency Response Team, Marzo 1999.
 - CES91
 - 
CESID.
Glosario de términos de Criptología.
Centro Superior de Información de la Defensa, 1991.
 - CH99
 - 
Stephen Ciullo and Daniel Hinojosa.
HP-UX kernel tuning and performance guide.
http://www.hp.com/techpartners/tuning.html, 1999.
 - Cha92
 - 
D. Brent Chapman.
Network (In)Security through IP packet filtering.
In Proceedings of the third USENIX Security Symposium,
  pages 63-76. The USENIX Association, Septiembre 1992.
 - Che92
 - 
William R. Cheswick.
An evening with Berferd, in which a cracker is lured, endured, and
  studied.
In Proceedings of the Winter USENIX Conference. The USENIX Association, Enero 1992.
 - CHN$^+$92
 - 
Andrew Cherry, Mark W. Henderson, William K. Nickless, Robert Olson, and Gene
  Rackow.
Pass or fail: A new test for password legitimacy, 1992.
 - CHS91
 - 
Bruce Corbridge, Robert Henig, and Charles Slater.
Packet filtering in an IP router.
In Proceedings of the Fifth LISA Conference, pages 227-232.
  The USENIX Association, Octubre 1991.
 - CKL97
 - 
M. Ruschitzka C. Ko and K. Levitt.
Execution monitoring of security-critical programs in distributed
  systems: A specification-based approach.
In Proceedings of the 1997 IEEE Symposium on Security and
  Privacy, pages 175-187. IEEE Computer Society, Mayo 1997.
 - Coc73
 - 
C.C. Cocks.
A note on non-secret encryption.
Technical report, CESG, Noviembre 1973.
 - Coh84
 - 
Fred Cohen.
Computer viruses: theory and experiments.
In 7th DoD/NBS Computer Security Conference Proceedings,
  pages 240-263, Septiembre 1984.
 - Coh99
 - 
Fred Cohen.
Simulating Cyber Attacks, Defenses and Consequences.
http://all.net/journal/ntb/simulate/simulate.html, Mayo 1999.
 - CoIST99
 - 
National Research Council Committee on Information Systems Trustworthiness.
Trust in Cyberspace.
National Academy Press, 1999.
 - Com88
 - 
Apollo Computer.
Managing SysV System Software.
Technical Report 010851-A00, Apollo Computer, Inc. (Hewlett Packard),
  Junio 1988.
 - Com95
 - 
Douglas E. Comer.
Internetworking with TCP/IP. Volume 1: Principles,
  Protocols & Architecture.
Prentice Hall, 3rd edition, 1995.
 - Con99
 - 
Intrusion Detection System Consortium.
Intrusion Detection Systems buyer´s guide.
Technical report, ICSA.NET, 1999.
 - Cow92
 - 
Randle Cowcher.
Physical Security.
In Keith M. Jackson and Jan Hruska, editors, Computer Security
  Reference Book, chapter 24, pages 311-332. Butterworth-Heinemann, 1992.
 - CR94
 - 
Kaare Christian and Susan Richter.
The Unix Operating System.
John Wiley & Sons, 1994.
 - Cru00
 - 
Jeff Crume.
Inside Internet Security: What hackers don´t want you to
  know.
Addison Wesley, 2000.
 - CWP$^+$00
 - 
Crispin Cowan, Perry Wagle, Calton Pu, Steve Beattie, and Jonathan Walpole.
Buffer Overflows: Attacks and Defenses for the Vulnerability
  of the Decade.
In Proceedings of the SANS 2000 Conference. The SANS Institute, 2000.
 - CZ95
 - 
D. Brent Chapman and Elizabeth D. Zwicky.
Building Internet Firewalls.
O´Reilly & Associates, 1st edition, Noviembre 1995.
 - dA88
 - 
Ana Maria de Alvaré.
How crackers crack passwords, or what passwords to avoid.
Technical Report UCID-21515, Lawrence Livermore National Laboratory,
  Septiembre 1988.
 - Dae96
 - 
Daemon9.
IP-Spoofing demystified.
Phrack Magazine, 7(48), Junio 1996.
 - Dau97
 - 
John Daugman.
Iris recognition for personal identification, 1997.
 - Dau98
 - 
John Daugman.
Recognizing persons by their iris patterns.
In Biometrics: Personal Identification in Networked
  Society, pages 103-121. Kluwer, 1998.
 - Den83
 - 
Dorothy Denning.
Cryptography and Data Security.
Addison-Wesley, 1983.
 - Den90
 - 
P. Denning.
Computers under attack.
ACM Press, 1990.
 - Det01
 - 
Dethy.
Examining portscan methods - Analysing Audible Techniques,
  January 2001.
http://www.synnergy.net/downloads/papers/portscan.txt.
 - DFW96
 - 
Drew Dean, Edward W. Felten, and Dan S. Wallach.
Java Security: from HotJava to Netscape and beyond.
In Proceedings of the IEEE Symposium on Security and
  Privacy, 1996.
 - DH76
 - 
W. Diffie and M. E. Hellman.
New directions in cryptography.
IEEE Transactions on Information Theory, IT-22:644-654,
  Noviembre 1976.
 - DH77
 - 
W. Diffie and M.E. Hellman.
Exhaustive cryptanalysis of the NBS data encryption standad.
Computer, 10(6):74-84, Junio 1977.
 - Dik99
 - 
Casper Dik.
Solaris 2 FAQ, Octubre 1999.
ftp://ftp.wins.uva.nl/pub/solaris/.
 - DNO01
 - 
Vasanthan Dasan, Alex Noordergraaf, and Lou Ordorica.
The Solaris Fingerprint Database - A Security Tool
  for Solaris Operating Environment Files.
Sun Microsystems, Mayo 2001.
Sun BluePrints OnLine.
 - DP84
 - 
D. W. Davies and W. L. Price.
Security for Computer Networks: An Introduction to Data Security
  in Teleprocessing and Electronic Funds Transfer.
John Wiley and Sons, New York, 1984.
 - Duf89
 - 
Tom Duff.
Experience with viruses on UNIX systems.
In USENIX Computing Systems, volume 2, 1989.
 - Ell70
 - 
J. H. Ellis.
The possibility of Non-Secret digital encryption.
Technical report, CESG, Enero 1970.
 - ER89
 - 
M.W. Eichin and J.A. Rochlis.
With microscope and tweezers: An analysis of the Internet Virus
  of November 1988.
In IEEE Security and Privacy, pages 326-343, 1989.
 - Esc98
 - 
Terry Escamilla.
Intrusion Detection: Network Security beyond the
  Firewall.
John Wiley and Sons, 1998.
 - Eve92
 - 
David Everett.
Identity verification and biometrics.
In Keith M. Jackson and Jan Hruska, editors, Computer Security
  Reference Book, chapter 10, pages 37-73. Butterworth-Heinemann, 1992.
 - FBDW96
 - 
Edward W. Felten, Dirk Balfanz, Drew Dean, and Dan S. Wallach.
Web Spoofing: an Internet Con Game.
Technical Report 540-96, Princeton University Department of Computer
  Science, 1996.
Revisado en febrero de 1997.
 - Fen99
 - 
Carole Fennelly.
The human side of computer security.
SunWorld, Julio 1999.
 - Fis95
 - 
John Fisher.
Securing X Windows.
Technical Report CIAC-2316 R.0, Department of Energy Computer
  Incident Advisory Capability - CIAC, Agosto 1995.
 - FK90
 - 
David C. Feldmeirer and Philip R. Karn.
UNIX password security - ten years later.
In G. Brassard, editor, CRYPTO89, pages 44-63.
  Springer-Verlag, 1990.
Lecture Notes in Computer Science No. 435.
 - Fly00a
 - 
Hal Flynn.
Back to the Basics: Solaris and inetd.conf, Marzo 2000.
http://www.securityfocus.com/focus/sun/articles/inetd[1,2].html.
 - Fly00b
 - 
Hal Flynn.
Back to the Basics: Solaris default processes and init.d, part
  III, Junio 2000.
http://www.securityfocus.com/focus/sun/articles/b5.html.
 - FPA98
 - 
Dan Farmer, Brad Powell, and Matthew Archibald.
Titan.
In Proceedings of the 12th Systems Administration Conference -
  LISA´98. The USENIX Association, Diciembre 1998.
 - Fre98
 - 
Martin Freiss.
Protecting networks with SATAN.
O'Reilly & Associates, 1st edition, Mayo 1998.
 - Fri95
 - 
Æleen Frisch.
Essential System Administration.
O´Reilly & Associates, 1995.
 - Fyo98
 - 
Fyodor.
Remote OS detection via TCP/IP Stack Fingerprinting,
  Octubre 1998.
http://www.insecure.org/nmap/nmap-fingerprinting-article.html.
 - G$^+$93
 - 
Virgil D. Gligor et al.
A Guide to understanding Covert Channel Analysis of Trusted
  Systems.
Technical Report NCSC-TG-030, National Computer Security Center,
  Noviembre 1993.
 - Gal96a
 - 
Miguel Ángel Gallardo.
Informatoscopia y tecnología forense.
In Ámbito Jurídico de las Tecnologías de la
  Información. Consejo General del Poder Judicial, 1996.
 - Gal96b
 - 
Miguel Ángel Gallardo.
Seguridad (e inseguridad) en Java.
Seguridad en Informática y Comunicaciones, (20), Junio 1996.
 - Gal96c
 - 
Peter Galvin.
Controlling ACLs.
SunWorld, Agosto 1996.
 - Gar95
 - 
Simson Garfinkel.
PGP: Pretty Good Privacy.
O'Reilly & Associates, Enero 1995.
 - GB97
 - 
Barbara Guttman and Robert Bagwill.
Internet Security Policy: A Technical Guide.
Technical report, National Institute of Standards and Technology,
  Julio 1997.
 - GB99
 - 
Marcus Goncalves and Steven Brown.
Check Point Firewall-1 Administration Guide.
McGrawHill, 1999.
 - GC94
 - 
Berny Goodheart and James Cox.
The Magic Garden Explained: The Internals of Unix System V
  Release 4, an Open Systems Design.
Prentice Hall, 1994.
 - GKK97
 - 
Eric Guerrino, Mike Kahn, and Ellen Kapito.
User authentication and encryption overview, 1997.
 - GL91
 - 
T.D. Garvey and Teresa F. Lunt.
Model-based Intrusion Detection.
In Proceedings of the 14th National Computer Security
  Conference, pages 372-385, Octubre 1991.
 - Gon97
 - 
Marcus Goncalves.
Firewalls Complete.
McGrawHill, 1997.
 - Gra00
 - 
Robert David Graham.
Network Intrusion Detection Systems FAQ v. 0.8.3, Marzo 2000.
http://www.robertgraham.com/pubs/network-intrusion-detection.html.
 - Gre99
 - 
Peter H. Gregory.
Solaris Security.
Prentice Hall and Sun Microsystems Press, 1st edition, 1999.
 - Gre00
 - 
Mark Grennan.
Firewall and Proxy Server HOWTO.
http://www.linuxdoc.org/HOWTO/Firewall-HOWTO.html, 2000.
 - GS96
 - 
Simson Garfinkel and Eugene H. Spafford.
Practical Unix & Internet Security.
O'Reilly & Associates, 2nd edition, Abril 1996.
 - GS97
 - 
Simson Garfinkel and Eugene H. Spafford.
Web Security & Commerce.
O'Reilly & Associates, 1st edition, Junio 1997.
 - GSTY96
 - 
H. Gobioff, S. Smith, J.D. Tygar, and B. Yee.
Smart cards in hostile environments.
In Proceedings of the 2nd USENIX Workshop on Electronic
  Commerce. The USENIX Association, Noviembre 1996.
 - Gun96
 - 
Shishir Gundavaram.
CGI Programming on the World Wide Web.
O'Reilly & Associates, 1st edition, Marzo 1996.
 - GUQ92
 - 
Louis Claude Guillou, Michel Ugon, and Jean-Jacques Quisquater.
The smart card - a standardized security device dedicated to public
  cryptology.
In Contemporary Cryptology - The Science of Information
  Integrity, pages 561-614. IEEE Press, 1992.
 - Gut96
 - 
Peter Gutmann.
Secure deletion of data from magnetic and solid-state memory.
In Sixth USENIX Security Symposium Proceedings. The USENIX Association, Julio 1996.
 - H$^+$02
 - 
Pete Herzot et al.
Open-Source Security Testing Methodology Manual v2.0.
Technical report, The Ideahamster Organization, Febrero 2002.
 - Hal94
 - 
Neil Haller.
The S/KEY one time password system.
In Proceedings of the ISOC Symposium on network and
  distributed systems security, Febrero 1994.
 - HB96
 - 
L. Todd Heberlein and Matt Bishop.
Attack class: Address spoofing.
In Proceedings of the 19th National Information Systems Security
  Conference, pages 371-377, Octubre 1996.
 - HC83
 - 
Richard C. Hollinger and John P. Clark.
Theft by Employees.
Lexington Books, 1983.
 - Her00
 - 
Peter Hernberg.
User Authentication HOWTO.
http://www.tldp.org/HOWTO/User-Authentication-HOWTO/, Mayo 2000.
 - Hig88
 - 
H.J. Highland.
Electromagnetic Eavesdropping Machines for Christmas?
Computers and Security, 7(4), 1988.
 - HJAW88
 - 
Matthew S. Hecht, Abhai Johri, Radhakrishna Aditham, and T. John Wei.
Experience adding C2 Security Features to Unix.
In USENIX Conference Proceedings, pages 133-146. The
  USENIX Association, Verano 1988.
 - HLMS90
 - 
Richard Heady, George Luger, Arthur Maccabe, and Mark Servilla.
The architecture of a Network Level Intrusion Detection
  System.
Technical Report CS90-20, University of New Mexico, Agosto 1990.
 - HN$^+$99
 - 
Bao Ha, Tina Nguyen, et al.
Slackware Linux Unleashed.
Sams Publishing, 1999.
 - HP96
 - 
Hewlet-Packard.
Managing HP-UX software with SD-UX.
HP, Enero 1996.
HP Part Number B2355-90107.
 - HP00a
 - 
Hewlett-Packard.
HP-UX Patch Management: a guide to patching HP-UX 10.x
  systems.
Hewlett-Packard, Enero 2000.
HP Part Number B3782-90828.
 - HP00b
 - 
Hewlett-Packard.
Managing Systems and Workgroups: A Guide for HP-UX System
  Administrators.
Hewlett-Packard, 2000.
HP Part Number B2355-90701.
 - Hu91
 - 
W. M. Hu.
Reducing timing channels with fuzzy time.
In Proceedings of the 1991 Symposium on Research in Security and
  Privacy, pages 8-20. IEEE Computer Society, Mayo 1991.
 - Hun92
 - 
Craig Hunt.
TCP/IP Network Administration.
O´Reilly & Associates, 1992.
 - Huo98
 - 
Simo Huopio.
Biometric Identification.
In Seminar on Network Security: Authorization and Access Control
  in Open Network Environment, 1998.
 - HW01
 - 
Kevin J. Houle and George M. Weaver.
Trends in Denial of Service attack technology.
Technical report, CERT Coordination Center, Carnegie Mellon
  University, Octubre 2001.
 - IBM97a
 - 
IBM.
AIX Version 4.3 Problem Solving Guide and
  Reference.
IBM, Octubre 1997.
IBM RedBook SC23-4123.
 - IBM97b
 - 
IBM.
AIX Version 4.3 System Management Guide:
  Communication and Networks.
IBM, Octubre 1997.
IBM RedBook SC23-4127.
 - IBM97c
 - 
IBM.
AIX Version 4.3 System Management Guide: Operating
  System and Devices.
IBM, Octubre 1997.
IBM RedBook SC23-2529.
 - IBM00a
 - 
IBM.
AIX 4.3 Elements of Security. Effective and Efficient
  Implementation.
IBM, Agosto 2000.
IBM RedBook SG24-5962-00.
 - IBM00b
 - 
IBM.
IBM Certification Study Guide. AIX Problem
  Determination Tools and Techniques.
IBM, Diciembre 2000.
IBM RedBook SG24-6185-00.
 - Ilg92
 - 
Koral Ilgun.
USTAT: A real-time intrusion detection system for unix.
In Proceedings of the 1993 Symposium on Security and Privacy,
  pages 16-28. IEEE Computer Society, Mayo 1992.
 - Ins97
 - 
Shawn Instentes.
Stack Smashing: What to do?
;login:, 22(2), Abril 1997.
 - ISV95
 - 
David Icove, Karl Seger, and William VonStorch.
Computer Crime. A Crimefighter's handbook.
O'Reilly & Associates, 1995.
 - JF01
 - 
David W. Chapman Jr. and Andy Fox.
Cisco© Secure PIX© Firewalls.
Cisco Press, 2001.
 - JTY97
 - 
Philippe Janson, Gene Tsudik, and Moti Yung.
Scalability and flexibility in authentication services: The
  KryptoKnight Approach.
In Proceedings of INFOCOM´97. IEEE Computer Society,
  1997.
 - JV93
 - 
Harold S. Javitz and Alfonso Valdes.
The NIDES Statistical Component: Description and
  Justification.
Technical report, SRI International, Marzo 1993.
 - Kah67
 - 
David Kahn.
The Codebreakers.
McMillan, 1967.
 - Kat88
 - 
J. Katz.
Seductions of Crime: Moral and Sensual Attractions in Doing
  Evil.
Basic Books, 1988.
 - Kem98
 - 
Richard A. Kemmerer.
NSTAT: A Model-Based Real-Time Network
  Intrusion Detection System.
Technical Report TRCS97-18, University of California, Junio 1998.
 - KI99
 - 
Gershon Kedem and Yuriko Ishihara.
Brute force attack on Unix passwords with SIMD computer.
In Proceedings of the 8th USENIX Security Symposium. The
  USENIX Association, Agosto 1999.
 - Kir95
 - 
Olaf Kirch.
The Linux Network Administrators´ Guide.
O´Reilly & Associates, 1995.
 - KK92
 - 
David Koblas and Michelle Koblas.
Socks.
In Proceedings of the Third Unix Security Symposium, pages
  77-83. The USENIX Association, Septiembre 1992.
 - Kla95
 - 
Christopher Klaus.
Stealth Scanning - Bypassing Firewalls and SATAN
  Detectors, Diciembre 1995.
Internet Security Systems, Inc.
 - Kle90
 - 
Daniel V. Klein.
Foiling the cracker: A survey of, and improvements to, password
  security.
In Unix Security Workshop, pages 5-14. The USENIX
  Association, Agosto 1990.
 - KMM95
 - 
R. Kohno, R. Meidan, and L.B. Milstein.
Spread Spectrum Access Methods for Wireless Communications.
IEEE Communications Magazine, 33:58-67, Enero 1995.
 - Ko96
 - 
Calvin Cheuk Wang Ko.
Execution Monitoring of Security-Critical Programs in a
  Distributed System: A Specification-Based Approach.
PhD thesis, University of California at Davis, 1996.
 - KP84
 - 
Brian W. Kernighan and Rob Pike.
The Unix Programming Environment.
Prentice Hall, 1984.
 - KS93
 - 
Gene H. Kim and Eugene H. Spafford.
The design and implementation of Tripwire: A file system integrity
  checker.
Technical Report CSD-TR-93-071, Purdue University, Noviembre 1993.
 - KS94a
 - 
Gene H. Kim and Eugene H. Spafford.
Experiences with Tripwire: using integrity checkers for intrusion
  detection.
In Systems Administration, Networking and Security Conference
  III. The USENIX Association, Abril 1994.
 - KS94b
 - 
Gene H. Kim and Eugene H. Spafford.
Writing, supporting and evaluating Tripwire: a publically available
  security tool.
In Proceedings of the USENIX Applications Development
  Symposium. The USENIX Association, 1994.
 - KS94c
 - 
Sandeep Kumar and Eugene Spafford.
An Application of Pattern Matching in Intrusion Detection.
Technical Report CSD-TR-94-013, Purdue University, Marzo 1994.
 - KT97
 - 
Micki Krause and Harold F. Tipton.
Handbook of Information Security Management.
CRC Press LLC, 1997.
 - Kum95
 - 
Sandeep Kumar.
Classification and Detection of Computer Intrusions.
PhD thesis, Purdue University, Agosto 1995.
 - L$^+$92
 - 
Teresa F. Lunt et al.
A real-time intrusion detection expert system (IDES). final
  technical report.
Technical report, SRI International, Febrero 1992.
 - Lam73
 - 
B. W. Lampson.
A note on the Confinement Problem.
Communications of the ACM, 16(10):613-615, Octubre 1973.
 - Lam81
 - 
Leslie Lamport.
Password authentication with insecure communication.
Communications of the ACM, 24(11):770-772, Noviembre 1981.
 - Lap91
 - 
J.C. Laprie.
Dependability: Basic concepts and terminology.
Springer-Verlag, 1991.
 - LBMC94
 - 
Carl E. Landwher, Alan R. Bull, John P. McDermott, and William S. Choi.
A taxonomy of computer program security flaws, with examples.
ACM Computing Surveys, 3(26), Septiembre 1994.
 - Lip75
 - 
Steven B. Lipner.
A note on the Confinement Problem.
Operating Systems Review, 9(5):192-196, Noviembre 1975.
 - Lis95
 - 
Justin Jay Lister.
Intrusion Detection Systems: an Introduction to the
  detection and prevention of computer abuse.
PhD thesis, University of Wollongong, 1995.
 - LU02
 - 
Juan Miguel Velasco López-Urda.
Seguridad bajo control: `outsourcing vs. in house', las claves
  para evaluar.
Seguridad en Informática y Comunicaciones, (49), Abril 2002.
 - Lun90
 - 
Teresa F. Lunt.
Detecting Intruders in Computer Systems.
In Proceedings of the Sixth Annual Symposium and Technical
  Displays on Physical and Electronic Security, 1990.
 - MA94
 - 
Roger Merckling and Anne Anderson.
RFC 57.0: Smart Card Introduction, Marzo 1994.
 - Mai96
 - 
Uriel Maimon.
Port Scanning without the SYN flag.
Phrack Magazine, 7(49), 1996.
 - Man91
 - 
Jason Manger.
Unix: The complete book.
Sigma Press, 1991.
 - Man96
 - 
U. Manber.
A simple scheme to make passwords based on One-Way functions much
  harder to crack.
Computers & Security, 15(2):171-176, 1996.
 - Mar88a
 - 
John Markhoff.
Author of computer `virus' is son of U.S. electronic security
  expert.
The New York Times, 5 Noviembre 1988.
 - Mar88b
 - 
John Markhoff.
A family´s passion for computers, gone sour.
The New York Times, 11 Noviembre 1988.
 - McC00
 - 
Ron McCarthy.
IP Filter on Solaris.
Sys Admin Magazine, 2000.
Solaris Suplement.
 - McH95
 - 
John McHugh.
Covert channel analysis.
In Handbook for the Computer Security Certification of Trusted
  Systems. Naval Research Laboratory, Enero 1995.
 - McI89
 - 
M. Douglas McIlroy.
Virology 101.
In USENIX Computing Systems, volume 2, 1989.
 - McM97
 - 
Dave McMordie.
Texture analysis of the human iris for high security authentication.
Technical Report Image Processing 304-529, Department of Electrical
  Engineering, McGill University, Diciembre 1997.
 - Mel97
 - 
Mark K. Mellis.
Surprises in the DMZ.
;login:, 22(1), Febrero 1997.
 - Men98
 - 
Phunda Menta.
Linux and random source bleaching.
Phrack Magazine, 8(54), 1998.
 - Mey89
 - 
Gordon R. Meyer.
The Social Organization of the Computer Underground.
PhD thesis, Northern Illinois University, 1989.
 - MF96
 - 
Gary McGraw and Edward Felten.
Java Security: Hostile Applets, Holes and Antidotes.
John Wiley and Sons, 1996.
 - MFS90
 - 
Barton P. Miller, Lars Fredriksen, and Bryan So.
An empirical study of the reliability of Unix utilities.
Communications of the ACM, 33(12):32-44, Diciembre 1990.
 - Mic98
 - 
Sun Microsystems.
Solaris 7 System Administration Guide, Volume I, Octubre
  1998.
http://docs.sun.com/.
 - MK94
 - 
Ira S. Moskowitz and Myong H. Kang.
Covert Channels - Here to Stay?
In Proceedings of COMPASS´94, pages 235-243. IEEE
  Press, Junio 1994.
 - MK99
 - 
Andrew D. McDonald and Markus G. Kuhn.
StegFS: A Steganographic File System for Linux.
In Andreas Pfitzmann, editor, Information Hiding, pages
  461-475. Springer-Verlag, 1999.
 - MKL$^+$95
 - 
Barton P. Miller, David Koski, Cjin Pheow Lee, Vivekananda Maganty, Ravi
  Murthy, Ajitkumar Natarajan, and Jeff Steidl.
Fuzz revisited: A re-examination of the reliability of Unix
  utilities and services.
ftp://grilled.cs.wisc.edu/technical_papers/fuzz-revisited.ps,
  1995.
 - MM00
 - 
Jim Mauro and Richard McDougall.
Solaris Internals: Core Kernel Architecture.
Prentice Hall and Sun Microsystems Press, 1st edition, 2000.
 - MNSS87
 - 
S.P. Miller, B.C. Neuman, J.I. Schiller, and J.H. Saltzer.
Kerberos Authentication and Authorization System.
In Project Athena Technical Plan, chapter E.2.1.
  Massachusetts Institute of Technology, Diciembre 1987.
 - Mog89
 - 
Jeffrey C. Mogul.
Simple and flexible datagram access control for Unix-based
  gateways.
In Proceedings of the USENIX Summer Conference, pages
  203-221. The USENIX Association, 1989.
 - Mor85
 - 
Robert Morris.
A Weakness in the 4.2BSD Unix TCP/IP Software.
Technical Report CSTR-117, AT&T Bell Laboratories,
  1985.
 - Mou00
 - 
Gerhard Mourani.
Get acquainted with Linux Security and Optimization System.
Technical report, Open Network Architecture, Enero 2000.
 - MPS$^+$93
 - 
Sead Muftic, Ahmed Patel, Peter Sanders, Rafael Colon, Jan Heijnsdijk, and Unto
  Pulkkinen.
Security in Open Systems.
John Wiley and Sons, 1993.
 - MS98
 - 
Nimisha V. Mehta and Karen R. Sollins.
Expanding and extending the security features of Java.
In Proceedings of the 7th USENIX Security Symposium. The
  USENIX Association, Enero 1998.
 - MT79
 - 
Robert Morris and Ken Thompson.
Password security: A case history.
Communications of the ACM, 22(11), Noviembre 1979.
 - MTHZ92
 - 
Refik Molva, Gene Tsudik, Els Van Herrenweghen, and Stefano Zatti.
KryptoKnight Authentication and Key Distribution Service.
In Proceedings of ESORICS 92, Octubre 1992.
 - MvOV96
 - 
Alfred J. Menezes, Paul C. van Oorschot, and Scott A. Vanstone.
Handbook of Applied Cryptography.
CRC Press, Octubre 1996.
 - NB01a
 - 
Alex Noordergraaf and Glenn Brunette.
The Solaris Security Toolkit - Installation,
  Configuration and Usage Guide.
Sun Microsystems, Junio 2001.
Sun BluePrints OnLine.
 - NB01b
 - 
Alex Noordergraaf and Glenn Brunette.
The Solaris Security Toolkit - Internals.
Sun Microsystems, Junio 2001.
Sun BluePrints OnLine.
 - NB01c
 - 
Alex Noordergraaf and Glenn Brunette.
The Solaris Security Toolkit - Quick Start.
Sun Microsystems, Junio 2001.
Sun BluePrints OnLine.
 - NB01d
 - 
Alex Noordergraaf and Glenn Brunette.
The Solaris Security Toolkit - Release Notes.
Sun Microsystems, Junio 2001.
Sun BluePrints OnLine.
 - Noo01
 - 
Alex Noordergraaf.
Building a JumpStart Infrastructure.
Sun Microsystems, Abril 2001.
Sun BluePrints OnLine.
 - Nor99
 - 
Stephen Northcutt.
Network Intrusion Detection: An Analyst´s Handbook.
New Riders, 1999.
 - NS78
 - 
R.M. Needham and M.D. Schroeder.
Using encryption for authentication in large networks of computers.
Communications of the ACM, 21(12):993-999, Diciembre 1978.
 - NSS89
 - 
Evi Nemeth, Garth Snyder, and Scott Seebass.
Unix System Administration Handbook.
Prentice Hall, 1989.
 - NW99
 - 
Alex Noordergraaf and Keith Watson.
Solaris Operating Environment Network Settings for
  Security.
Sun Microsystems, Diciembre 1999.
Sun BluePrints OnLine.
 - Olo92
 - 
Tomas Olovsson.
A structured approach to computer security.
Technical Report 122, Chalmers University of Technology, 1992.
 - One96
 - 
Aleph One.
Smashing the stack for fun and profit.
Phrack Magazine, 7(49), Noviembre 1996.
 - Org88
 - 
International Standards Organization.
Information Processing Systems - OSI RM.
Technical Report 97 7498-2, ISO/TC, 1988.
Part 2: Security Architecture.
 - oS80
 - 
National Bureau of Standars.
DES Modes of Operation.
Technical Report NBS FIPS PUB 81, U.S. Department of Commerce,
  Dicembre 1980.
 - oST84
 - 
National Institute of Standards and Technology.
Digital Signature Standard.
Technical Report NIST FIPS PUB 185, U.S. Department of Commerce, Mayo
  1984.
 - OT88
 - 
Tim O´Reilly and Grace Todino.
Managing UUCP and UseNet.
O'Reilly & Associates, Marzo 1988.
 - otUAH90
 - 
Department of the US Army Headquarters.
Basic cryptanalysis.
Technical Report FM-34-40-2, United States Army, Septiembre 1990.
 - P$^+$94
 - 
Susan Peppard et al.
Unix Unleashed.
Sams Publishing, 1st edition, 1994.
 - Par81
 - 
Donn B. Parker.
Computer Security Management.
Prentice Hall, 1981.
 - Par94
 - 
Donn B. Parker.
Demonstrating the elements of information security with threats.
In Proceedings of the 17th National Computer Security
  Conference, pages 421-430, 1994.
 - Par98
 - 
William Parkhurst.
Cisco Router OSPF Design and Implementation Guide.
McGrawHill, 1998.
 - PB93
 - 
W. Timothy Polk and Lawrence E. Bassham.
Security issues in the Database Language SQL, Julio 1993.
 - Pfl97
 - 
Charles P. Pfleeger.
Security in computing.
Prentice Hall, 1997.
 - Phi97
 - 
Ken Phillips.
Biometric identification comparison chart.
PC Week, Marzo 1997.
 - Pit00
 - 
Jesús Pita.
La tarjeta inteligente como medio de identificación electrónica y
  acceso a servicios de seguridad: la experiencia de la FNMT-RCM.
Seguridad en Informática y Comunicaciones, (39), Abril 2000.
 - PK91
 - 
P.A. Porras and R.A. Kemmerer.
Analyzing covert storage channels.
In Proceedings of the 1991 Symposium on Research in Security and
  Privacy, pages 36-51. IEEE Computer Society, Mayo 1991.
 - PK92
 - 
P.A. Porras and R.A. Kemmerer.
Penetration state transition analysis: a rule-based intrusion
  detection approach.
In Proceedings of the 8th Computer Security Application
  Conference, pages 220-229, Noviembre 1992.
 - Pla83
 - 
José Plans.
La pratique de l´audit informatique.
Eyrolles, 1983.
 - PN92
 - 
Norman E. Proctor and Peter G. Neumann.
Architectural implications of Covert Channels.
In Proceedings of the 15th National Computer Security
  Conference, pages 28-43, Octubre 1992.
 - Por92
 - 
Phillip A. Porras.
STAT: A State Transition Analysis Tool for
  Intrusion Detection.
PhD thesis, University of California, Junio 1992.
 - PP01
 - 
Marty Poniatowski and Martin Poniatowski.
HP-UX 11i System Administration Handbook and Toolkit.
Prentice Hall, Abril 2001.
 - PPK93
 - 
Pinkas, Parker, and Kaijser.
SESAME: An Introduction, 1993.
 - RA94
 - 
Marcus J. Ranum and Frederick M. Avolio.
A toolkit and methods for internet firewalls.
In Proceedings of the Technical Summer Conference, pages
  37-44. The USENIX Association, Junio 1994.
 - Rad92
 - 
Peter V. Radatti.
Computer virus awareness for UNIX.
NCSA News, 3:8, Mayo 1992.
 - Rad93
 - 
Peter V. Radatti.
The plausibility of UNIX virus attacks.
Technical report, Cybersoft, Inc., 1993.
 - Rad95
 - 
Peter V. Radatti.
Computer viruses in Unix networks.
Technical report, Cybersoft, Inc., 1995.
 - Rad97
 - 
Peter V. Radatti.
MrMean the hacker.
;login:, Octubre 1997.
 - Ran93
 - 
Marcus J. Ranum.
Thinking about Firewalls.
In Proceedings of the Second SANS Conference, Abril 1993.
 - Ran95
 - 
Marcus J. Ranum.
Firewalls Frequently Asked Questions, 1995.
 - Ran98
 - 
Marcus J. Ranum.
Intrusion Detection: Challenges and Myths.
Technical report, Network Flight Recorder, Inc., 1998.
 - Ran00
 - 
Marcus J. Ranum.
The network police blotter.
;login:, 25(5), Agosto 2000.
 - RCG96
 - 
A. Ribagorda, A. Calvo, and M.A. Gallardo.
Seguridad en Unix: Sistemas Abiertos e Internet.
Paraninfo, 1996.
 - Reh00
 - 
Rafeeg Rehman.
HP Certified: HP-UX System Administration.
Prentice Hall, Mayo 2000.
 - Rei89
 - 
N. Reichman.
Breaking confidences: Organizational influences on insider trading.
The Sociological Quarterly, 30:185-204, 1989.
 - Ris01
 - 
Neil B. Riser.
An overview of some the current spoofing threats, Julio 2001.
The SANS Institute.
 - Rit86
 - 
Dennis M. Ritchie.
On the security of UNIX.
In UNIX System Manager's Manual, 4.3 BSD, Virtual VAX-11
  Version, pages 17:1-3. University of California, Berkeley, CA, Abril 1986.
 - Riv90
 - 
Ron Rivest.
The MD4 message digest algorithm.
In Crypto´90 Abstracts, pages 281-291, Agosto 1990.
 - Riv92
 - 
Ron Rivest.
The MD5 message digest algorithm, Abril 1992.
Internet Request for Comments 1321.
 - Rob94
 - 
Andrew T. Robinson.
Internet Firewalls: An Introduction.
Technical report, NetMAINE, P.O. BOX 8258, Portland, ME 04104-8258,
  USA, 1994.
 - Roe99
 - 
Martin Roesch.
Snort - Lightweight Intrusion Detection for Networks.
In Proceedings of the 13th Systems Administration Conference -
  LISA´99. The USENIX Association, Noviembre 1999.
 - Rou96
 - 
Route.
Project Loki: ICMP Tunnelling.
Phrack Magazine, 7(49), Noviembre 1996.
 - Row96
 - 
Craig H. Rowland.
Covert Channels in the TCP/IP Protocol Suite, 1996.
 - Roy88
 - 
Mike Royko.
Here´s how to stop computer vandals.
The Chicago Tribune, 7 Noviembre 1988.
 - Rus00
 - 
Rusty Russell.
Linux ipchains HOWTO, v. 1.0.8.
http://www.linuxdoc.org/HOWTO/IPCHAINS-HOWTO.html, Julio 2000.
 - Rus02
 - 
Rusty Russell.
Linux 2.4 Packet Filtering HOWTO v. 1.2.
  http://netfilter.samba.org/documentation/HOWTO/packet-filtering-HOWTO.txt,
  2002.
 - RW84
 - 
James A. Reeds and Peter J. Weinberger.
File security and the UNIX system crypt command.
AT&T Bell Labs Technical Journal, 63(8):1673-1683, Octubre
  1984.
 - Sal90
 - 
A. Salomaa.
Public Key Cryptography.
Springer-Verlag, 1990.
 - SBL90
 - 
Corey Sandler, Tom Badgett, and Larry Lefkowitz.
VAX Security: Protecting the System and the Data.
John Wiley and Sons, 1990.
 - Sch94
 - 
Bruce Schneier.
Applied Cryptography: Protocols, Algorithms and Source Code in
  C.
John Wiley & Sons, 1994.
 - Sch97
 - 
John Schimmel.
A historical look at firewall technologies.
;login:, 22(1), Febrero 1997.
 - See89
 - 
Donn Seeley.
A tour of the Worm.
In Proceedings of 1989 Winter USENIX Conference. The USENIX Association, Febrero 1989.
 - Sei99
 - 
Kurt Seifried.
Linux Administrator´s Security Guide.
http://www.securityportal.com/lasg/, 1999.
 - Sem96
 - 
Chuck Semeria.
Internet Firewalls and Security.
Technical report, 3Com, 1996.
 - Ser91
 - 
Omri Serlin.
SVR4 may become the first truly secure Unix.
UNIXWORLD, VIII(11):39-40, Noviembre 1991.
 - SG91
 - 
Shiuhpyng Winston Shieh and Virgil D. Gligor.
A pattern-oriented intrusion model and its applications.
In Proceedings of the 1991 IEEE Computer Society Symposium on
  Research in Security and Privacy, pages 327-342. IEEE Computer
  Society, Mayo 1991.
 - SH82
 - 
John F. Shoch and Jon A. Hupp.
The worm programs - early experience with a distributed computation.
Communications of the ACM, 25(3):172-180, Marzo 1982.
 - SH95
 - 
Karanjit Siyan and Chris Hare.
Internet y seguridad en redes.
Prentice Hall, 1995.
 - Sha49
 - 
C. E. Shannon.
Communication theory of secrecy systems.
Bell Systems Technology Journal, 28:657-715, 1949.
 - Sho00
 - 
Adam Shostack.
Security code review guidelines, 2000.
 - Sim90
 - 
Steve Simmons.
Life without root.
In Proceedings of the 4th Systems Administration Conference -
  LISA´90. The USENIX Association, Octubre 1990.
 - SK98
 - 
Bruce Schneier and John Kelsey.
Cryptographic support for secure logs on untrusted machines.
In Proceedings of the 7th USENIX Security Symposium. The
  USENIX Association, Enero 1998.
 - Skl01
 - 
Sandor W. Sklar.
The AIX Error Logging Facility.
Sys Admin, 10(6), Junio 2001.
AIX Administration Supplement.
 - SM70
 - 
Gresham Sykes and David Matza.
Techniques of Neutralization: A Theory of Delinquency.
In Marvin E. Wolfgang et al., editors, The Sociology of Crime
  and Delinquency, pages 292-299. John Wiley and Sons, 2nd edition, 1970.
 - Smi92
 - 
Martin Smith.
Personnel Security.
In Keith M. Jackson and Jan Hruska, editors, Computer Security
  Reference Book, chapter 33, pages 417-436. Butterworth-Heinemann, 1992.
 - Smi97
 - 
Nathan P. Smith.
Stack Smashing Vulnerabilities in the Unix Operating
  System, 1997.
http://millcomm.com/~nate/machines/security/stack-smashing/.
 - Smu90
 - 
Peter Smulders.
The Threat of Information Theft by Reception of
  Electromagnetic Radiation from RS-232 Cables.
Computers and Security, 9(1), 1990.
 - Spa88
 - 
Eugene H. Spafford.
The Internet Worm program: An analysis.
Technical Report CSD-TR-823, Purdue University Department of Computer
  Science, 1988.
 - Spa89
 - 
Eugene H. Spafford.
The Internet Worm: Crisis and aftermath.
Communications of the ACM, 32(6):678-687, 1989.
 - Spa90
 - 
Eugene H. Spafford.
Are computer hacker break-ins ethical?
Technical Report CSD-TR-994, Purdue University, Julio 1990.
 - Spa91a
 - 
Eugene H. Spafford.
The Internet Worm incident.
Technical Report CSD-TR-933, Purdue University Department of Computer
  Science, 1991.
 - Spa91b
 - 
Eugene H. Spafford.
OPUS: Preventing weak password choices.
In Proceedings of the 14th National Computer Security
  Conference, pages 446-455, Octubre 1991.
 - Spi01a
 - 
Lance Spitzner.
Intrusion Detection for Check Point FireWall-1.
http://www.enteract.com/~lspitz/intrusion.html, Diciembre 2001.
 - Spi01b
 - 
Lance Spitzner.
Know your enemy: Honeynets.
http://project.honeynet.org/papers/honeynet/, 2001.
 - Spr01
 - 
Ian P. Springer.
HP-UX FAQ, Noviembre 2001.
http://www.faqs.org/faqs/hp/hpux-faq/.
 - Sta00
 - 
British Standard.
Information technology - Code of practice for information security
  management.
Technical Report BS ISO/IEC 17799:2000, British Standard Publishing
  Limited, Diciembre 2000.
 - Ste90
 - 
W. Richard Stevens.
Unix Network Programming.
Prentice Hall, 1990.
 - Ste94
 - 
W. Richard Stevens.
TCP/IP Illustrated Volume I: The Protocols.
Addison Wesley, 1994.
 - Ste98a
 - 
Ingo Stengel.
Security architectures based on active firewall components, 1998.
FH-Darmstadt.
 - Ste98b
 - 
Kevin Steves.
Building a bastion host using HP-UX 10.
http://people.hp.se/stevesk/bastion10.html, 1998.
 - Ste00
 - 
Kevin Steves.
Building a bastion host using HP-UX 11.
http://people.hp.se/stevesk/bastion11.html, 2000.
 - Sto88
 - 
Cliff Stoll.
Stalking the wily hacker.
Communications of the ACM, 31(5):484-497, Mayo 1988.
 - Sto89
 - 
Cliff Stoll.
The Cuckoo's Egg.
Doubleday, 1989.
 - Sun96
 - 
Aurobindo Sundaram.
An introduction to Intrusion Detection.
Crossroads: The ACM Student Magazine, 2(4), Abril 1996.
 - Swi92
 - 
Peter Swinbank.
Electromagnetic Radiation.
In Keith M. Jackson and Jan Hruska, editors, Computer Security
  Reference Book, chapter 11, pages 75-90. Butterworth-Heinemann, 1992.
 - Tan91
 - 
Andrew Tanenbaum.
Operating Systems: Design and Implementation.
Prentice Hall, 1991.
 - Tan95
 - 
Andrew Tanenbaum.
Distributed Operating Systems.
Prentice Hall, 1995.
 - Tan96
 - 
Andrew Tanenbaum.
Computer Networks.
Prentice Hall, 1996.
 - Tho84
 - 
Ken Thompson.
Refections on trusting trust.
Communications of the ACM, 27(8), Agosto 1984.
 - Thu00
 - 
Thuull.
Anomaly Detection Systems.
2600: The Hacker Quartely, 17(3), Primavera 2000.
 - Tom75
 - 
Raymond S. Tomlinson.
Selecting Sequence Numbers.
In Proceedings of SIGCOMM/SIGOPS Interprocess
  Communication Workshop, pages 11-23. ACM, 1975.
 - Tom94
 - 
Chris Tomlinson.
A Practical Guide to Solaris Security.
Technical report, Sun Microsystems (UK), Marzo 1994.
 - Tox00
 - 
Bob Toxen.
Real World Linux Security: Intrusion Prevention,
  Detection and Recovery.
Prentice Hall, 1st edition, 2000.
 - TW93
 - 
G. Winfield Treese and Alec Wolman.
X through the firewall, and other applications relays.
In Proceedings of the USENIX Summer Conference. The USENIX Association, Junio 1993.
 - TY82
 - 
Rebecca Thomas and Jean Yates.
A User Guide to the Unix System.
McGrawHill, 1982.
 - V$^+$00
 - 
Scott Vetter et al.
IBM Certification Study Guide. AIX v4.3 System
  Administration.
IBM, 2000.
IBM RedBook SG24-5129-00.
 - vE85
 - 
Wim van Eck.
Electromagnetic Radiation from Video Display Units: An
  Eavesdropping Risk?
Computers and Security, 4(4), 1985.
 - Ven92
 - 
Wietse Venema.
TCP Wrapper: Network monitoring, access control and booby traps.
In Proceedings of the 3rd USENIX Unix Security
  Symposium, pages 85-92. The USENIX Association, Septiembre 1992.
 - Vic94
 - 
Bob Vickers.
Guide to safe X, Febrero 1994.
 - vKPG97
 - 
Robert van Kralingen, Corien Prins, and Jan Grijpink.
Using your body as a key: legal aspects of biometrics, 1997.
 - Vol97
 - 
Yuri Volobuev.
Playing redir games with ARP and ICMP, Septiembre 1997.
 - vSS98
 - 
Carl van Schaik and Paul Smeddle.
A Steganographic File System Implementation for Linux.
Technical report, University of Cape Town (South Africa), Octubre
  1998.
 - vSTO94
 - 
R. G. van Schyndel, A. Z. Tirkel, and C. F. Osborne.
A digital watermark.
In International Conference on Image Processing, volume 2,
  pages 86-90. IEEE, 1994.
 - WA02
 - 
Dameon D. Welch-Abernathy.
Essential Checkpoint Firewall-1: An Installation, Configuration,
  and Troubleshooting Guide.
Addison Wesley, 2002.
 - WC94
 - 
John P. Wack and Lisa J. Carnahan.
Keeping your site comfortably secure: an introduction to Internet
  Firewalls.
Technical report, National Institute of Standards and Technology
  (NIST), Diciembre 1994.
Special Publication 800-10.
 - WD95
 - 
Ira S. Winkler and Brian Dealy.
Information security technology?...Don´t rely on it. A case
  study in social engineering.
In Proceedings of the 5th USENIX Unix Security Symposium.
  The USENIX Association, Junio 1995.
 - Wil74
 - 
M. J. Williamson.
Non-Secret encryption using a finite field.
Technical report, CESG, Enero 1974.
 - Wil76
 - 
M. J. Williamson.
Thoughts on cheaper Non-Secret encryption.
Technical report, CESG, Agosto 1976.
 - Won01
 - 
Chris Wong.
HP-UX 11i Security.
Prentice Hall, Septiembre 2001.
 - Wra91a
 - 
J.C. Wray.
An analysis of covert timing channels.
In Proceedings of the 1991 Symposium on Research in Security and
  Privacy, pages 2-7. IEEE Computer Society, Mayo 1991.
 - Wra91b
 - 
J.W. Wray.
Toward a mathematical foundation for information flow security.
In Proceedings of the 1991 Symposium on Research in Security and
  Privacy, pages 21-34. IEEE Computer Society, Mayo 1991.
 - Wre98
 - 
Dave Wreski.
Linux Security Administrator´s Guide.
http://nic.com/~dave/Security/, 1998.
 - Ylo96
 - 
Tatu Ylonen.
SSH - Secure login connetions over the Internet.
In Proceedings of the 6th USENIX Security Symposium,
  pages 37-42. The USENIX Association, Julio 1996.
 - Zie01
 - 
Robert L. Ziegler.
Linux Firewalls.
New Riders, 2nd edition, 2001.
 - Zim95a
 - 
Phil Zimmermann.
The Official PGP User´s Guide.
M.I.T. Press, 1995.
 - Zim95b
 - 
Phil Zimmermann.
PGP: Source Code and Internals.
M.I.T. Press, 1995.
 
Subsecciones
© 2002 Antonio Villalón Huerta