- Age85
-
National Security Agency.
Magnetic Tape Degausser.
Technical Report L14-4-A, National Security Agency/Central Security
Service, Octubre 1985.
- AK96
-
Ross J. Anderson and Markus Kuhn.
Tamper resistance - a cautionary note.
In Proceedings of the 2nd USENIX Workshop on Electronic
Commerce, pages 1-11. The USENIX Association, Noviembre 1996.
- AKS96
-
Taimur Aslam, Ivan Krsul, and Eugene H. Spafford.
Use of a taxonomy of security faults.
Technical Report TR-96-051, Purdue University Department of Computer
Science, 1996.
- ALGJ98
-
Stefan Axelsson, Ulf Lindqvist, Ulf Gustafson, and Erland Jonsson.
An approach to Unix Security Logging.
In Proceedings of the 21st National Information Systems Security
Conference, pages 62-75. National Institute of Standards and
Technology/National Computer Security Center, Octubre 1998.
- And80
-
James P. Anderson.
Computer security threat monitoring and surveillance.
Technical report, James P. Anderson Co., Abril 1980.
- And94
-
Ross J. Anderson.
Why Cryptosystems Fail.
Communications of the ACM, 37:32-40, Noviembre 1994.
- And97
-
Ross J. Anderson.
Tamperproofing of Chip Cards.
Enviado a la lista cypherpunks@cyberpass.net por William H.
Geiger III en septiembre, 1997.
- Ano97
-
Anonymous.
Maximum Security: a hacker´s guide to protecting your
Internet site and network.
McMillan Computer Publishing, 1997.
- Ano01
-
Anonymous.
Maximum Linux Security: a hacker´s guide to protecting
your Linux Server and Workstation.
Sams Publishing, 2001.
- ANS98
-
R. J. Anderson, R. M. Needham, and A. Shamir.
The Steganographic File System.
Lecture Notes in Computer Science, 1525:73-82, 1998.
- Ark99
-
Ofir Arkin.
Network Scanning Techniques, Noviembre 1999.
PubliCom Communications Solutions.
- Atk93
-
Derek A. Atkins.
Charon: Kerberos Extensions for Authentication over Secondary
Networks.
PhD thesis, Department of Electrical Engineering and Computer
Science, Massachusetts Institute of Technology, 1993.
- Axe98
-
Stefan Axelsson.
Research in intrusion-detection systems: A survey.
Technical Report 98-17, Chalmers University of Technology, Diciembre
1998.
- B$^+$85
-
Sheila L. Brand et al.
Department of Defense Trusted Computer System Evaluation
Criteria.
Technical Report DOD 5200.28-STD, Department of Defense, Diciembre
1985.
- B$^+$88
-
Sue Berg et al.
Glossary of Computer Security Terms.
Technical Report NCSC-TG-004, National Computer Security Center,
Octubre 1988.
- Bac86
-
Maurice J. Bach.
The Design of the Unix Operating System.
Prentice Hall, 1986.
- Bai97
-
Edward C. Bailey.
Maximum RPM: Taking the Red Hat Package Manager
to the limit.
Red Hat Software, Inc., 1997.
- BAW96
-
F. Bouchier, J.S. Ahrens, and G. Wells.
Laboratory evaluation of the IriScan prototype biometric
identifier.
Technical Report SAND96-1033, Sandia National Laboratories, Abril
1996.
- BB99
-
Roland Büschkes and Mark Borning.
Transaction-based Anomaly Detection.
In Proceedings of Workshop on Intrusion Detection and Network
Monitoring. The USENIX Association, Abril 1999.
- BBD$^+$96
-
Michael Beck, Harold Bohme, Mirko Dzladzka, Ulrich Kunitz, Robert Magnus, and
Dirk Verworner.
Linux Kernel Internals.
Addison-Wesley, 1996.
- BCOW94
-
John Barkley, Lisa Carnahan, Karen Olsen, and John Wack.
Improving security in a network environment.
In John Barkley, editor, Security in Open Systems,
chapter 10. National Institute of Standards and Technology (NIST),
Julio 1994.
Special Publication 800-7.
- BD96
-
Matt Bishop and Michael Dilger.
Checking for race conditions in file accesses.
Computing System, 9(2):131-152, Primavera 1996.
- Bel89
-
Steven M. Bellovin.
Security problems in the TCP/IP Protocol Suite.
Computer Communications Review, 19(2):32-48, Abril 1989.
- Bel92
-
Steven M. Bellovin.
There be dragons.
In Proceedings of the Third USENIX Security Symposium,
pages 1-16. The USENIX Association, Septiembre 1992.
- Bel93a
-
Walter Belgers.
Unix password security, 1993.
- Bel93b
-
Steven M. Bellovin.
Packets found on an internet.
Computer Communications Review, 23(3):26-31, Julio 1993.
- Bel96
-
Steven M. Bellovin.
RFC1498: Defending against sequence number attacks, Mayo 1996.
- BF99
-
Dirk Balfanz and Edward W. Felten.
Hand-held computers can be better smart cards.
In Proceedings of the 8th USENIX Security Symposium. The
USENIX Association, Agosto 1999.
- BGML96
-
W. Bender, D. Gruhl, N. Morimoto, and A. Lu.
Techniques for data hiding.
IBM Systems Journal, 35(3,4), 1996.
- Bha01
-
Nishchal Bhalla.
AIX 4.3 bastion host guidelines, Junio 2001.
The SANS Institute.
- Bis86
-
Matt Bishop.
How to write a setuid program.
;login:, 12(1), Enero 1986.
- Bis90
-
Matt Bishop.
A Security Analysis of the NTP Protocol, 1990.
- Bis91
-
Matt Bishop.
A proactive password checker.
In D.T. Lindsay and W.L. Price, editors, Proceedings of the 7th
International Conference on Information Security, pages 150-158, Mayo 1991.
- Bis92
-
Matt Bishop.
Anatomy of a proactive password changer.
In Proceedings of USENIX Unix Security III. The USENIX Association, 1992.
- Bis95
-
Matt Bishop.
Race conditions, files and security flaws; or the tortoise and the
hare redux.
Technical Report CSE-95-8, University of California at Davis, 1995.
- BK95
-
Matt Bishop and Daniel V. Klein.
Improving system security via proactive password checking.
Computers & Security, 14(3):233-249, 1995.
- Bla93
-
Matt Blaze.
A Cryptographic File System for Unix.
In Proceedings of the 1st ACM Conference on Computer and
Communications Security, pages 9-16. ACM, Noviembre 1993.
- BM91
-
Steven M. Bellovin and Michael Merritt.
Limitations of the Kerberos Authentication System.
In Proceedings of the Winter 1991 USENIX Conference,
pages 253-267. The USENIX Association, Enero 1991.
- BPB00
-
Bill Ball, David Pitts, and William Ball.
Red Hat Linux 7 Unleashed.
Sams Publishing, 2000.
- C$^+$91
-
Dave Curry et al.
RFC1244: Site Security Handbook.
Internet Activities Board, Julio 1991.
- C$^+$98
-
Crispin Cowan et al.
StackGuard: automatic adaptative detection and prevention of
buffer-overflow attacks.
In Proceedings of the 7th USENIX Security Symposium. The
USENIX Association, Enero 1998.
- CA97a
-
Bryan Costales and Eric Allman.
Sendmail.
O´Reilly & Associates, 2nd edition, Enero 1997.
- CA97b
-
Bryan Costales and Eric Allman.
Sendmail Desktop Reference.
O´Reilly & Associates, Marzo 1997.
- Cab96
-
Pino Caballero.
Introducción a la Criptografía.
Ra-Ma, 1996.
- Caj82
-
Valentin Sanz Caja.
Vulnerabilidad y seguridad de los sistemas informáticos.
Fundación Citema, 1982.
- CB94
-
William R. Cheswick and Steven M. Bellovin.
Firewalls and Internet Security: Repelling the wily hacker.
Addison Wesley, 1994.
- CC86
-
D.B. Cornish and R. V. Clarke.
The Reasoning Criminal: Rational Choice Perspectives on
Offending.
Springer-Verlag, 1986.
- CDK94
-
G.F. Couloris, J. Dollimore, and T. Kindberg.
Distributed Systems. Concepts and design.
Addison Wesley, 2nd edition, 1994.
- CDM97
-
Rémy Card, Eric Dumas, and Frack Mével.
Programación Linux 2.0: API de sistema y funcionamiento del
núcleo.
Eyrolles, 1997.
- Cen91
-
National Computer Security Center.
Data Remanence in Automated Information Systems.
Technical Report NCSC-TG-025, National Computer Security Center,
Septiembre 1991.
- CER99
-
CERT.
CERT Advisory CA-99-02. Trojan Horses.
Technical report, Computer Emergency Response Team, Marzo 1999.
- CES91
-
CESID.
Glosario de términos de Criptología.
Centro Superior de Información de la Defensa, 1991.
- CH99
-
Stephen Ciullo and Daniel Hinojosa.
HP-UX kernel tuning and performance guide.
http://www.hp.com/techpartners/tuning.html, 1999.
- Cha92
-
D. Brent Chapman.
Network (In)Security through IP packet filtering.
In Proceedings of the third USENIX Security Symposium,
pages 63-76. The USENIX Association, Septiembre 1992.
- Che92
-
William R. Cheswick.
An evening with Berferd, in which a cracker is lured, endured, and
studied.
In Proceedings of the Winter USENIX Conference. The USENIX Association, Enero 1992.
- CHN$^+$92
-
Andrew Cherry, Mark W. Henderson, William K. Nickless, Robert Olson, and Gene
Rackow.
Pass or fail: A new test for password legitimacy, 1992.
- CHS91
-
Bruce Corbridge, Robert Henig, and Charles Slater.
Packet filtering in an IP router.
In Proceedings of the Fifth LISA Conference, pages 227-232.
The USENIX Association, Octubre 1991.
- CKL97
-
M. Ruschitzka C. Ko and K. Levitt.
Execution monitoring of security-critical programs in distributed
systems: A specification-based approach.
In Proceedings of the 1997 IEEE Symposium on Security and
Privacy, pages 175-187. IEEE Computer Society, Mayo 1997.
- Coc73
-
C.C. Cocks.
A note on non-secret encryption.
Technical report, CESG, Noviembre 1973.
- Coh84
-
Fred Cohen.
Computer viruses: theory and experiments.
In 7th DoD/NBS Computer Security Conference Proceedings,
pages 240-263, Septiembre 1984.
- Coh99
-
Fred Cohen.
Simulating Cyber Attacks, Defenses and Consequences.
http://all.net/journal/ntb/simulate/simulate.html, Mayo 1999.
- CoIST99
-
National Research Council Committee on Information Systems Trustworthiness.
Trust in Cyberspace.
National Academy Press, 1999.
- Com88
-
Apollo Computer.
Managing SysV System Software.
Technical Report 010851-A00, Apollo Computer, Inc. (Hewlett Packard),
Junio 1988.
- Com95
-
Douglas E. Comer.
Internetworking with TCP/IP. Volume 1: Principles,
Protocols & Architecture.
Prentice Hall, 3rd edition, 1995.
- Con99
-
Intrusion Detection System Consortium.
Intrusion Detection Systems buyer´s guide.
Technical report, ICSA.NET, 1999.
- Cow92
-
Randle Cowcher.
Physical Security.
In Keith M. Jackson and Jan Hruska, editors, Computer Security
Reference Book, chapter 24, pages 311-332. Butterworth-Heinemann, 1992.
- CR94
-
Kaare Christian and Susan Richter.
The Unix Operating System.
John Wiley & Sons, 1994.
- Cru00
-
Jeff Crume.
Inside Internet Security: What hackers don´t want you to
know.
Addison Wesley, 2000.
- CWP$^+$00
-
Crispin Cowan, Perry Wagle, Calton Pu, Steve Beattie, and Jonathan Walpole.
Buffer Overflows: Attacks and Defenses for the Vulnerability
of the Decade.
In Proceedings of the SANS 2000 Conference. The SANS Institute, 2000.
- CZ95
-
D. Brent Chapman and Elizabeth D. Zwicky.
Building Internet Firewalls.
O´Reilly & Associates, 1st edition, Noviembre 1995.
- dA88
-
Ana Maria de Alvaré.
How crackers crack passwords, or what passwords to avoid.
Technical Report UCID-21515, Lawrence Livermore National Laboratory,
Septiembre 1988.
- Dae96
-
Daemon9.
IP-Spoofing demystified.
Phrack Magazine, 7(48), Junio 1996.
- Dau97
-
John Daugman.
Iris recognition for personal identification, 1997.
- Dau98
-
John Daugman.
Recognizing persons by their iris patterns.
In Biometrics: Personal Identification in Networked
Society, pages 103-121. Kluwer, 1998.
- Den83
-
Dorothy Denning.
Cryptography and Data Security.
Addison-Wesley, 1983.
- Den90
-
P. Denning.
Computers under attack.
ACM Press, 1990.
- Det01
-
Dethy.
Examining portscan methods - Analysing Audible Techniques,
January 2001.
http://www.synnergy.net/downloads/papers/portscan.txt.
- DFW96
-
Drew Dean, Edward W. Felten, and Dan S. Wallach.
Java Security: from HotJava to Netscape and beyond.
In Proceedings of the IEEE Symposium on Security and
Privacy, 1996.
- DH76
-
W. Diffie and M. E. Hellman.
New directions in cryptography.
IEEE Transactions on Information Theory, IT-22:644-654,
Noviembre 1976.
- DH77
-
W. Diffie and M.E. Hellman.
Exhaustive cryptanalysis of the NBS data encryption standad.
Computer, 10(6):74-84, Junio 1977.
- Dik99
-
Casper Dik.
Solaris 2 FAQ, Octubre 1999.
ftp://ftp.wins.uva.nl/pub/solaris/.
- DNO01
-
Vasanthan Dasan, Alex Noordergraaf, and Lou Ordorica.
The Solaris Fingerprint Database - A Security Tool
for Solaris Operating Environment Files.
Sun Microsystems, Mayo 2001.
Sun BluePrints OnLine.
- DP84
-
D. W. Davies and W. L. Price.
Security for Computer Networks: An Introduction to Data Security
in Teleprocessing and Electronic Funds Transfer.
John Wiley and Sons, New York, 1984.
- Duf89
-
Tom Duff.
Experience with viruses on UNIX systems.
In USENIX Computing Systems, volume 2, 1989.
- Ell70
-
J. H. Ellis.
The possibility of Non-Secret digital encryption.
Technical report, CESG, Enero 1970.
- ER89
-
M.W. Eichin and J.A. Rochlis.
With microscope and tweezers: An analysis of the Internet Virus
of November 1988.
In IEEE Security and Privacy, pages 326-343, 1989.
- Esc98
-
Terry Escamilla.
Intrusion Detection: Network Security beyond the
Firewall.
John Wiley and Sons, 1998.
- Eve92
-
David Everett.
Identity verification and biometrics.
In Keith M. Jackson and Jan Hruska, editors, Computer Security
Reference Book, chapter 10, pages 37-73. Butterworth-Heinemann, 1992.
- FBDW96
-
Edward W. Felten, Dirk Balfanz, Drew Dean, and Dan S. Wallach.
Web Spoofing: an Internet Con Game.
Technical Report 540-96, Princeton University Department of Computer
Science, 1996.
Revisado en febrero de 1997.
- Fen99
-
Carole Fennelly.
The human side of computer security.
SunWorld, Julio 1999.
- Fis95
-
John Fisher.
Securing X Windows.
Technical Report CIAC-2316 R.0, Department of Energy Computer
Incident Advisory Capability - CIAC, Agosto 1995.
- FK90
-
David C. Feldmeirer and Philip R. Karn.
UNIX password security - ten years later.
In G. Brassard, editor, CRYPTO89, pages 44-63.
Springer-Verlag, 1990.
Lecture Notes in Computer Science No. 435.
- Fly00a
-
Hal Flynn.
Back to the Basics: Solaris and inetd.conf, Marzo 2000.
http://www.securityfocus.com/focus/sun/articles/inetd[1,2].html.
- Fly00b
-
Hal Flynn.
Back to the Basics: Solaris default processes and init.d, part
III, Junio 2000.
http://www.securityfocus.com/focus/sun/articles/b5.html.
- FPA98
-
Dan Farmer, Brad Powell, and Matthew Archibald.
Titan.
In Proceedings of the 12th Systems Administration Conference -
LISA´98. The USENIX Association, Diciembre 1998.
- Fre98
-
Martin Freiss.
Protecting networks with SATAN.
O'Reilly & Associates, 1st edition, Mayo 1998.
- Fri95
-
Æleen Frisch.
Essential System Administration.
O´Reilly & Associates, 1995.
- Fyo98
-
Fyodor.
Remote OS detection via TCP/IP Stack Fingerprinting,
Octubre 1998.
http://www.insecure.org/nmap/nmap-fingerprinting-article.html.
- G$^+$93
-
Virgil D. Gligor et al.
A Guide to understanding Covert Channel Analysis of Trusted
Systems.
Technical Report NCSC-TG-030, National Computer Security Center,
Noviembre 1993.
- Gal96a
-
Miguel Ángel Gallardo.
Informatoscopia y tecnología forense.
In Ámbito Jurídico de las Tecnologías de la
Información. Consejo General del Poder Judicial, 1996.
- Gal96b
-
Miguel Ángel Gallardo.
Seguridad (e inseguridad) en Java.
Seguridad en Informática y Comunicaciones, (20), Junio 1996.
- Gal96c
-
Peter Galvin.
Controlling ACLs.
SunWorld, Agosto 1996.
- Gar95
-
Simson Garfinkel.
PGP: Pretty Good Privacy.
O'Reilly & Associates, Enero 1995.
- GB97
-
Barbara Guttman and Robert Bagwill.
Internet Security Policy: A Technical Guide.
Technical report, National Institute of Standards and Technology,
Julio 1997.
- GB99
-
Marcus Goncalves and Steven Brown.
Check Point Firewall-1 Administration Guide.
McGrawHill, 1999.
- GC94
-
Berny Goodheart and James Cox.
The Magic Garden Explained: The Internals of Unix System V
Release 4, an Open Systems Design.
Prentice Hall, 1994.
- GKK97
-
Eric Guerrino, Mike Kahn, and Ellen Kapito.
User authentication and encryption overview, 1997.
- GL91
-
T.D. Garvey and Teresa F. Lunt.
Model-based Intrusion Detection.
In Proceedings of the 14th National Computer Security
Conference, pages 372-385, Octubre 1991.
- Gon97
-
Marcus Goncalves.
Firewalls Complete.
McGrawHill, 1997.
- Gra00
-
Robert David Graham.
Network Intrusion Detection Systems FAQ v. 0.8.3, Marzo 2000.
http://www.robertgraham.com/pubs/network-intrusion-detection.html.
- Gre99
-
Peter H. Gregory.
Solaris Security.
Prentice Hall and Sun Microsystems Press, 1st edition, 1999.
- Gre00
-
Mark Grennan.
Firewall and Proxy Server HOWTO.
http://www.linuxdoc.org/HOWTO/Firewall-HOWTO.html, 2000.
- GS96
-
Simson Garfinkel and Eugene H. Spafford.
Practical Unix & Internet Security.
O'Reilly & Associates, 2nd edition, Abril 1996.
- GS97
-
Simson Garfinkel and Eugene H. Spafford.
Web Security & Commerce.
O'Reilly & Associates, 1st edition, Junio 1997.
- GSTY96
-
H. Gobioff, S. Smith, J.D. Tygar, and B. Yee.
Smart cards in hostile environments.
In Proceedings of the 2nd USENIX Workshop on Electronic
Commerce. The USENIX Association, Noviembre 1996.
- Gun96
-
Shishir Gundavaram.
CGI Programming on the World Wide Web.
O'Reilly & Associates, 1st edition, Marzo 1996.
- GUQ92
-
Louis Claude Guillou, Michel Ugon, and Jean-Jacques Quisquater.
The smart card - a standardized security device dedicated to public
cryptology.
In Contemporary Cryptology - The Science of Information
Integrity, pages 561-614. IEEE Press, 1992.
- Gut96
-
Peter Gutmann.
Secure deletion of data from magnetic and solid-state memory.
In Sixth USENIX Security Symposium Proceedings. The USENIX Association, Julio 1996.
- H$^+$02
-
Pete Herzot et al.
Open-Source Security Testing Methodology Manual v2.0.
Technical report, The Ideahamster Organization, Febrero 2002.
- Hal94
-
Neil Haller.
The S/KEY one time password system.
In Proceedings of the ISOC Symposium on network and
distributed systems security, Febrero 1994.
- HB96
-
L. Todd Heberlein and Matt Bishop.
Attack class: Address spoofing.
In Proceedings of the 19th National Information Systems Security
Conference, pages 371-377, Octubre 1996.
- HC83
-
Richard C. Hollinger and John P. Clark.
Theft by Employees.
Lexington Books, 1983.
- Her00
-
Peter Hernberg.
User Authentication HOWTO.
http://www.tldp.org/HOWTO/User-Authentication-HOWTO/, Mayo 2000.
- Hig88
-
H.J. Highland.
Electromagnetic Eavesdropping Machines for Christmas?
Computers and Security, 7(4), 1988.
- HJAW88
-
Matthew S. Hecht, Abhai Johri, Radhakrishna Aditham, and T. John Wei.
Experience adding C2 Security Features to Unix.
In USENIX Conference Proceedings, pages 133-146. The
USENIX Association, Verano 1988.
- HLMS90
-
Richard Heady, George Luger, Arthur Maccabe, and Mark Servilla.
The architecture of a Network Level Intrusion Detection
System.
Technical Report CS90-20, University of New Mexico, Agosto 1990.
- HN$^+$99
-
Bao Ha, Tina Nguyen, et al.
Slackware Linux Unleashed.
Sams Publishing, 1999.
- HP96
-
Hewlet-Packard.
Managing HP-UX software with SD-UX.
HP, Enero 1996.
HP Part Number B2355-90107.
- HP00a
-
Hewlett-Packard.
HP-UX Patch Management: a guide to patching HP-UX 10.x
systems.
Hewlett-Packard, Enero 2000.
HP Part Number B3782-90828.
- HP00b
-
Hewlett-Packard.
Managing Systems and Workgroups: A Guide for HP-UX System
Administrators.
Hewlett-Packard, 2000.
HP Part Number B2355-90701.
- Hu91
-
W. M. Hu.
Reducing timing channels with fuzzy time.
In Proceedings of the 1991 Symposium on Research in Security and
Privacy, pages 8-20. IEEE Computer Society, Mayo 1991.
- Hun92
-
Craig Hunt.
TCP/IP Network Administration.
O´Reilly & Associates, 1992.
- Huo98
-
Simo Huopio.
Biometric Identification.
In Seminar on Network Security: Authorization and Access Control
in Open Network Environment, 1998.
- HW01
-
Kevin J. Houle and George M. Weaver.
Trends in Denial of Service attack technology.
Technical report, CERT Coordination Center, Carnegie Mellon
University, Octubre 2001.
- IBM97a
-
IBM.
AIX Version 4.3 Problem Solving Guide and
Reference.
IBM, Octubre 1997.
IBM RedBook SC23-4123.
- IBM97b
-
IBM.
AIX Version 4.3 System Management Guide:
Communication and Networks.
IBM, Octubre 1997.
IBM RedBook SC23-4127.
- IBM97c
-
IBM.
AIX Version 4.3 System Management Guide: Operating
System and Devices.
IBM, Octubre 1997.
IBM RedBook SC23-2529.
- IBM00a
-
IBM.
AIX 4.3 Elements of Security. Effective and Efficient
Implementation.
IBM, Agosto 2000.
IBM RedBook SG24-5962-00.
- IBM00b
-
IBM.
IBM Certification Study Guide. AIX Problem
Determination Tools and Techniques.
IBM, Diciembre 2000.
IBM RedBook SG24-6185-00.
- Ilg92
-
Koral Ilgun.
USTAT: A real-time intrusion detection system for unix.
In Proceedings of the 1993 Symposium on Security and Privacy,
pages 16-28. IEEE Computer Society, Mayo 1992.
- Ins97
-
Shawn Instentes.
Stack Smashing: What to do?
;login:, 22(2), Abril 1997.
- ISV95
-
David Icove, Karl Seger, and William VonStorch.
Computer Crime. A Crimefighter's handbook.
O'Reilly & Associates, 1995.
- JF01
-
David W. Chapman Jr. and Andy Fox.
Cisco© Secure PIX© Firewalls.
Cisco Press, 2001.
- JTY97
-
Philippe Janson, Gene Tsudik, and Moti Yung.
Scalability and flexibility in authentication services: The
KryptoKnight Approach.
In Proceedings of INFOCOM´97. IEEE Computer Society,
1997.
- JV93
-
Harold S. Javitz and Alfonso Valdes.
The NIDES Statistical Component: Description and
Justification.
Technical report, SRI International, Marzo 1993.
- Kah67
-
David Kahn.
The Codebreakers.
McMillan, 1967.
- Kat88
-
J. Katz.
Seductions of Crime: Moral and Sensual Attractions in Doing
Evil.
Basic Books, 1988.
- Kem98
-
Richard A. Kemmerer.
NSTAT: A Model-Based Real-Time Network
Intrusion Detection System.
Technical Report TRCS97-18, University of California, Junio 1998.
- KI99
-
Gershon Kedem and Yuriko Ishihara.
Brute force attack on Unix passwords with SIMD computer.
In Proceedings of the 8th USENIX Security Symposium. The
USENIX Association, Agosto 1999.
- Kir95
-
Olaf Kirch.
The Linux Network Administrators´ Guide.
O´Reilly & Associates, 1995.
- KK92
-
David Koblas and Michelle Koblas.
Socks.
In Proceedings of the Third Unix Security Symposium, pages
77-83. The USENIX Association, Septiembre 1992.
- Kla95
-
Christopher Klaus.
Stealth Scanning - Bypassing Firewalls and SATAN
Detectors, Diciembre 1995.
Internet Security Systems, Inc.
- Kle90
-
Daniel V. Klein.
Foiling the cracker: A survey of, and improvements to, password
security.
In Unix Security Workshop, pages 5-14. The USENIX
Association, Agosto 1990.
- KMM95
-
R. Kohno, R. Meidan, and L.B. Milstein.
Spread Spectrum Access Methods for Wireless Communications.
IEEE Communications Magazine, 33:58-67, Enero 1995.
- Ko96
-
Calvin Cheuk Wang Ko.
Execution Monitoring of Security-Critical Programs in a
Distributed System: A Specification-Based Approach.
PhD thesis, University of California at Davis, 1996.
- KP84
-
Brian W. Kernighan and Rob Pike.
The Unix Programming Environment.
Prentice Hall, 1984.
- KS93
-
Gene H. Kim and Eugene H. Spafford.
The design and implementation of Tripwire: A file system integrity
checker.
Technical Report CSD-TR-93-071, Purdue University, Noviembre 1993.
- KS94a
-
Gene H. Kim and Eugene H. Spafford.
Experiences with Tripwire: using integrity checkers for intrusion
detection.
In Systems Administration, Networking and Security Conference
III. The USENIX Association, Abril 1994.
- KS94b
-
Gene H. Kim and Eugene H. Spafford.
Writing, supporting and evaluating Tripwire: a publically available
security tool.
In Proceedings of the USENIX Applications Development
Symposium. The USENIX Association, 1994.
- KS94c
-
Sandeep Kumar and Eugene Spafford.
An Application of Pattern Matching in Intrusion Detection.
Technical Report CSD-TR-94-013, Purdue University, Marzo 1994.
- KT97
-
Micki Krause and Harold F. Tipton.
Handbook of Information Security Management.
CRC Press LLC, 1997.
- Kum95
-
Sandeep Kumar.
Classification and Detection of Computer Intrusions.
PhD thesis, Purdue University, Agosto 1995.
- L$^+$92
-
Teresa F. Lunt et al.
A real-time intrusion detection expert system (IDES). final
technical report.
Technical report, SRI International, Febrero 1992.
- Lam73
-
B. W. Lampson.
A note on the Confinement Problem.
Communications of the ACM, 16(10):613-615, Octubre 1973.
- Lam81
-
Leslie Lamport.
Password authentication with insecure communication.
Communications of the ACM, 24(11):770-772, Noviembre 1981.
- Lap91
-
J.C. Laprie.
Dependability: Basic concepts and terminology.
Springer-Verlag, 1991.
- LBMC94
-
Carl E. Landwher, Alan R. Bull, John P. McDermott, and William S. Choi.
A taxonomy of computer program security flaws, with examples.
ACM Computing Surveys, 3(26), Septiembre 1994.
- Lip75
-
Steven B. Lipner.
A note on the Confinement Problem.
Operating Systems Review, 9(5):192-196, Noviembre 1975.
- Lis95
-
Justin Jay Lister.
Intrusion Detection Systems: an Introduction to the
detection and prevention of computer abuse.
PhD thesis, University of Wollongong, 1995.
- LU02
-
Juan Miguel Velasco López-Urda.
Seguridad bajo control: `outsourcing vs. in house', las claves
para evaluar.
Seguridad en Informática y Comunicaciones, (49), Abril 2002.
- Lun90
-
Teresa F. Lunt.
Detecting Intruders in Computer Systems.
In Proceedings of the Sixth Annual Symposium and Technical
Displays on Physical and Electronic Security, 1990.
- MA94
-
Roger Merckling and Anne Anderson.
RFC 57.0: Smart Card Introduction, Marzo 1994.
- Mai96
-
Uriel Maimon.
Port Scanning without the SYN flag.
Phrack Magazine, 7(49), 1996.
- Man91
-
Jason Manger.
Unix: The complete book.
Sigma Press, 1991.
- Man96
-
U. Manber.
A simple scheme to make passwords based on One-Way functions much
harder to crack.
Computers & Security, 15(2):171-176, 1996.
- Mar88a
-
John Markhoff.
Author of computer `virus' is son of U.S. electronic security
expert.
The New York Times, 5 Noviembre 1988.
- Mar88b
-
John Markhoff.
A family´s passion for computers, gone sour.
The New York Times, 11 Noviembre 1988.
- McC00
-
Ron McCarthy.
IP Filter on Solaris.
Sys Admin Magazine, 2000.
Solaris Suplement.
- McH95
-
John McHugh.
Covert channel analysis.
In Handbook for the Computer Security Certification of Trusted
Systems. Naval Research Laboratory, Enero 1995.
- McI89
-
M. Douglas McIlroy.
Virology 101.
In USENIX Computing Systems, volume 2, 1989.
- McM97
-
Dave McMordie.
Texture analysis of the human iris for high security authentication.
Technical Report Image Processing 304-529, Department of Electrical
Engineering, McGill University, Diciembre 1997.
- Mel97
-
Mark K. Mellis.
Surprises in the DMZ.
;login:, 22(1), Febrero 1997.
- Men98
-
Phunda Menta.
Linux and random source bleaching.
Phrack Magazine, 8(54), 1998.
- Mey89
-
Gordon R. Meyer.
The Social Organization of the Computer Underground.
PhD thesis, Northern Illinois University, 1989.
- MF96
-
Gary McGraw and Edward Felten.
Java Security: Hostile Applets, Holes and Antidotes.
John Wiley and Sons, 1996.
- MFS90
-
Barton P. Miller, Lars Fredriksen, and Bryan So.
An empirical study of the reliability of Unix utilities.
Communications of the ACM, 33(12):32-44, Diciembre 1990.
- Mic98
-
Sun Microsystems.
Solaris 7 System Administration Guide, Volume I, Octubre
1998.
http://docs.sun.com/.
- MK94
-
Ira S. Moskowitz and Myong H. Kang.
Covert Channels - Here to Stay?
In Proceedings of COMPASS´94, pages 235-243. IEEE
Press, Junio 1994.
- MK99
-
Andrew D. McDonald and Markus G. Kuhn.
StegFS: A Steganographic File System for Linux.
In Andreas Pfitzmann, editor, Information Hiding, pages
461-475. Springer-Verlag, 1999.
- MKL$^+$95
-
Barton P. Miller, David Koski, Cjin Pheow Lee, Vivekananda Maganty, Ravi
Murthy, Ajitkumar Natarajan, and Jeff Steidl.
Fuzz revisited: A re-examination of the reliability of Unix
utilities and services.
ftp://grilled.cs.wisc.edu/technical_papers/fuzz-revisited.ps,
1995.
- MM00
-
Jim Mauro and Richard McDougall.
Solaris Internals: Core Kernel Architecture.
Prentice Hall and Sun Microsystems Press, 1st edition, 2000.
- MNSS87
-
S.P. Miller, B.C. Neuman, J.I. Schiller, and J.H. Saltzer.
Kerberos Authentication and Authorization System.
In Project Athena Technical Plan, chapter E.2.1.
Massachusetts Institute of Technology, Diciembre 1987.
- Mog89
-
Jeffrey C. Mogul.
Simple and flexible datagram access control for Unix-based
gateways.
In Proceedings of the USENIX Summer Conference, pages
203-221. The USENIX Association, 1989.
- Mor85
-
Robert Morris.
A Weakness in the 4.2BSD Unix TCP/IP Software.
Technical Report CSTR-117, AT&T Bell Laboratories,
1985.
- Mou00
-
Gerhard Mourani.
Get acquainted with Linux Security and Optimization System.
Technical report, Open Network Architecture, Enero 2000.
- MPS$^+$93
-
Sead Muftic, Ahmed Patel, Peter Sanders, Rafael Colon, Jan Heijnsdijk, and Unto
Pulkkinen.
Security in Open Systems.
John Wiley and Sons, 1993.
- MS98
-
Nimisha V. Mehta and Karen R. Sollins.
Expanding and extending the security features of Java.
In Proceedings of the 7th USENIX Security Symposium. The
USENIX Association, Enero 1998.
- MT79
-
Robert Morris and Ken Thompson.
Password security: A case history.
Communications of the ACM, 22(11), Noviembre 1979.
- MTHZ92
-
Refik Molva, Gene Tsudik, Els Van Herrenweghen, and Stefano Zatti.
KryptoKnight Authentication and Key Distribution Service.
In Proceedings of ESORICS 92, Octubre 1992.
- MvOV96
-
Alfred J. Menezes, Paul C. van Oorschot, and Scott A. Vanstone.
Handbook of Applied Cryptography.
CRC Press, Octubre 1996.
- NB01a
-
Alex Noordergraaf and Glenn Brunette.
The Solaris Security Toolkit - Installation,
Configuration and Usage Guide.
Sun Microsystems, Junio 2001.
Sun BluePrints OnLine.
- NB01b
-
Alex Noordergraaf and Glenn Brunette.
The Solaris Security Toolkit - Internals.
Sun Microsystems, Junio 2001.
Sun BluePrints OnLine.
- NB01c
-
Alex Noordergraaf and Glenn Brunette.
The Solaris Security Toolkit - Quick Start.
Sun Microsystems, Junio 2001.
Sun BluePrints OnLine.
- NB01d
-
Alex Noordergraaf and Glenn Brunette.
The Solaris Security Toolkit - Release Notes.
Sun Microsystems, Junio 2001.
Sun BluePrints OnLine.
- Noo01
-
Alex Noordergraaf.
Building a JumpStart Infrastructure.
Sun Microsystems, Abril 2001.
Sun BluePrints OnLine.
- Nor99
-
Stephen Northcutt.
Network Intrusion Detection: An Analyst´s Handbook.
New Riders, 1999.
- NS78
-
R.M. Needham and M.D. Schroeder.
Using encryption for authentication in large networks of computers.
Communications of the ACM, 21(12):993-999, Diciembre 1978.
- NSS89
-
Evi Nemeth, Garth Snyder, and Scott Seebass.
Unix System Administration Handbook.
Prentice Hall, 1989.
- NW99
-
Alex Noordergraaf and Keith Watson.
Solaris Operating Environment Network Settings for
Security.
Sun Microsystems, Diciembre 1999.
Sun BluePrints OnLine.
- Olo92
-
Tomas Olovsson.
A structured approach to computer security.
Technical Report 122, Chalmers University of Technology, 1992.
- One96
-
Aleph One.
Smashing the stack for fun and profit.
Phrack Magazine, 7(49), Noviembre 1996.
- Org88
-
International Standards Organization.
Information Processing Systems - OSI RM.
Technical Report 97 7498-2, ISO/TC, 1988.
Part 2: Security Architecture.
- oS80
-
National Bureau of Standars.
DES Modes of Operation.
Technical Report NBS FIPS PUB 81, U.S. Department of Commerce,
Dicembre 1980.
- oST84
-
National Institute of Standards and Technology.
Digital Signature Standard.
Technical Report NIST FIPS PUB 185, U.S. Department of Commerce, Mayo
1984.
- OT88
-
Tim O´Reilly and Grace Todino.
Managing UUCP and UseNet.
O'Reilly & Associates, Marzo 1988.
- otUAH90
-
Department of the US Army Headquarters.
Basic cryptanalysis.
Technical Report FM-34-40-2, United States Army, Septiembre 1990.
- P$^+$94
-
Susan Peppard et al.
Unix Unleashed.
Sams Publishing, 1st edition, 1994.
- Par81
-
Donn B. Parker.
Computer Security Management.
Prentice Hall, 1981.
- Par94
-
Donn B. Parker.
Demonstrating the elements of information security with threats.
In Proceedings of the 17th National Computer Security
Conference, pages 421-430, 1994.
- Par98
-
William Parkhurst.
Cisco Router OSPF Design and Implementation Guide.
McGrawHill, 1998.
- PB93
-
W. Timothy Polk and Lawrence E. Bassham.
Security issues in the Database Language SQL, Julio 1993.
- Pfl97
-
Charles P. Pfleeger.
Security in computing.
Prentice Hall, 1997.
- Phi97
-
Ken Phillips.
Biometric identification comparison chart.
PC Week, Marzo 1997.
- Pit00
-
Jesús Pita.
La tarjeta inteligente como medio de identificación electrónica y
acceso a servicios de seguridad: la experiencia de la FNMT-RCM.
Seguridad en Informática y Comunicaciones, (39), Abril 2000.
- PK91
-
P.A. Porras and R.A. Kemmerer.
Analyzing covert storage channels.
In Proceedings of the 1991 Symposium on Research in Security and
Privacy, pages 36-51. IEEE Computer Society, Mayo 1991.
- PK92
-
P.A. Porras and R.A. Kemmerer.
Penetration state transition analysis: a rule-based intrusion
detection approach.
In Proceedings of the 8th Computer Security Application
Conference, pages 220-229, Noviembre 1992.
- Pla83
-
José Plans.
La pratique de l´audit informatique.
Eyrolles, 1983.
- PN92
-
Norman E. Proctor and Peter G. Neumann.
Architectural implications of Covert Channels.
In Proceedings of the 15th National Computer Security
Conference, pages 28-43, Octubre 1992.
- Por92
-
Phillip A. Porras.
STAT: A State Transition Analysis Tool for
Intrusion Detection.
PhD thesis, University of California, Junio 1992.
- PP01
-
Marty Poniatowski and Martin Poniatowski.
HP-UX 11i System Administration Handbook and Toolkit.
Prentice Hall, Abril 2001.
- PPK93
-
Pinkas, Parker, and Kaijser.
SESAME: An Introduction, 1993.
- RA94
-
Marcus J. Ranum and Frederick M. Avolio.
A toolkit and methods for internet firewalls.
In Proceedings of the Technical Summer Conference, pages
37-44. The USENIX Association, Junio 1994.
- Rad92
-
Peter V. Radatti.
Computer virus awareness for UNIX.
NCSA News, 3:8, Mayo 1992.
- Rad93
-
Peter V. Radatti.
The plausibility of UNIX virus attacks.
Technical report, Cybersoft, Inc., 1993.
- Rad95
-
Peter V. Radatti.
Computer viruses in Unix networks.
Technical report, Cybersoft, Inc., 1995.
- Rad97
-
Peter V. Radatti.
MrMean the hacker.
;login:, Octubre 1997.
- Ran93
-
Marcus J. Ranum.
Thinking about Firewalls.
In Proceedings of the Second SANS Conference, Abril 1993.
- Ran95
-
Marcus J. Ranum.
Firewalls Frequently Asked Questions, 1995.
- Ran98
-
Marcus J. Ranum.
Intrusion Detection: Challenges and Myths.
Technical report, Network Flight Recorder, Inc., 1998.
- Ran00
-
Marcus J. Ranum.
The network police blotter.
;login:, 25(5), Agosto 2000.
- RCG96
-
A. Ribagorda, A. Calvo, and M.A. Gallardo.
Seguridad en Unix: Sistemas Abiertos e Internet.
Paraninfo, 1996.
- Reh00
-
Rafeeg Rehman.
HP Certified: HP-UX System Administration.
Prentice Hall, Mayo 2000.
- Rei89
-
N. Reichman.
Breaking confidences: Organizational influences on insider trading.
The Sociological Quarterly, 30:185-204, 1989.
- Ris01
-
Neil B. Riser.
An overview of some the current spoofing threats, Julio 2001.
The SANS Institute.
- Rit86
-
Dennis M. Ritchie.
On the security of UNIX.
In UNIX System Manager's Manual, 4.3 BSD, Virtual VAX-11
Version, pages 17:1-3. University of California, Berkeley, CA, Abril 1986.
- Riv90
-
Ron Rivest.
The MD4 message digest algorithm.
In Crypto´90 Abstracts, pages 281-291, Agosto 1990.
- Riv92
-
Ron Rivest.
The MD5 message digest algorithm, Abril 1992.
Internet Request for Comments 1321.
- Rob94
-
Andrew T. Robinson.
Internet Firewalls: An Introduction.
Technical report, NetMAINE, P.O. BOX 8258, Portland, ME 04104-8258,
USA, 1994.
- Roe99
-
Martin Roesch.
Snort - Lightweight Intrusion Detection for Networks.
In Proceedings of the 13th Systems Administration Conference -
LISA´99. The USENIX Association, Noviembre 1999.
- Rou96
-
Route.
Project Loki: ICMP Tunnelling.
Phrack Magazine, 7(49), Noviembre 1996.
- Row96
-
Craig H. Rowland.
Covert Channels in the TCP/IP Protocol Suite, 1996.
- Roy88
-
Mike Royko.
Here´s how to stop computer vandals.
The Chicago Tribune, 7 Noviembre 1988.
- Rus00
-
Rusty Russell.
Linux ipchains HOWTO, v. 1.0.8.
http://www.linuxdoc.org/HOWTO/IPCHAINS-HOWTO.html, Julio 2000.
- Rus02
-
Rusty Russell.
Linux 2.4 Packet Filtering HOWTO v. 1.2.
http://netfilter.samba.org/documentation/HOWTO/packet-filtering-HOWTO.txt,
2002.
- RW84
-
James A. Reeds and Peter J. Weinberger.
File security and the UNIX system crypt command.
AT&T Bell Labs Technical Journal, 63(8):1673-1683, Octubre
1984.
- Sal90
-
A. Salomaa.
Public Key Cryptography.
Springer-Verlag, 1990.
- SBL90
-
Corey Sandler, Tom Badgett, and Larry Lefkowitz.
VAX Security: Protecting the System and the Data.
John Wiley and Sons, 1990.
- Sch94
-
Bruce Schneier.
Applied Cryptography: Protocols, Algorithms and Source Code in
C.
John Wiley & Sons, 1994.
- Sch97
-
John Schimmel.
A historical look at firewall technologies.
;login:, 22(1), Febrero 1997.
- See89
-
Donn Seeley.
A tour of the Worm.
In Proceedings of 1989 Winter USENIX Conference. The USENIX Association, Febrero 1989.
- Sei99
-
Kurt Seifried.
Linux Administrator´s Security Guide.
http://www.securityportal.com/lasg/, 1999.
- Sem96
-
Chuck Semeria.
Internet Firewalls and Security.
Technical report, 3Com, 1996.
- Ser91
-
Omri Serlin.
SVR4 may become the first truly secure Unix.
UNIXWORLD, VIII(11):39-40, Noviembre 1991.
- SG91
-
Shiuhpyng Winston Shieh and Virgil D. Gligor.
A pattern-oriented intrusion model and its applications.
In Proceedings of the 1991 IEEE Computer Society Symposium on
Research in Security and Privacy, pages 327-342. IEEE Computer
Society, Mayo 1991.
- SH82
-
John F. Shoch and Jon A. Hupp.
The worm programs - early experience with a distributed computation.
Communications of the ACM, 25(3):172-180, Marzo 1982.
- SH95
-
Karanjit Siyan and Chris Hare.
Internet y seguridad en redes.
Prentice Hall, 1995.
- Sha49
-
C. E. Shannon.
Communication theory of secrecy systems.
Bell Systems Technology Journal, 28:657-715, 1949.
- Sho00
-
Adam Shostack.
Security code review guidelines, 2000.
- Sim90
-
Steve Simmons.
Life without root.
In Proceedings of the 4th Systems Administration Conference -
LISA´90. The USENIX Association, Octubre 1990.
- SK98
-
Bruce Schneier and John Kelsey.
Cryptographic support for secure logs on untrusted machines.
In Proceedings of the 7th USENIX Security Symposium. The
USENIX Association, Enero 1998.
- Skl01
-
Sandor W. Sklar.
The AIX Error Logging Facility.
Sys Admin, 10(6), Junio 2001.
AIX Administration Supplement.
- SM70
-
Gresham Sykes and David Matza.
Techniques of Neutralization: A Theory of Delinquency.
In Marvin E. Wolfgang et al., editors, The Sociology of Crime
and Delinquency, pages 292-299. John Wiley and Sons, 2nd edition, 1970.
- Smi92
-
Martin Smith.
Personnel Security.
In Keith M. Jackson and Jan Hruska, editors, Computer Security
Reference Book, chapter 33, pages 417-436. Butterworth-Heinemann, 1992.
- Smi97
-
Nathan P. Smith.
Stack Smashing Vulnerabilities in the Unix Operating
System, 1997.
http://millcomm.com/~nate/machines/security/stack-smashing/.
- Smu90
-
Peter Smulders.
The Threat of Information Theft by Reception of
Electromagnetic Radiation from RS-232 Cables.
Computers and Security, 9(1), 1990.
- Spa88
-
Eugene H. Spafford.
The Internet Worm program: An analysis.
Technical Report CSD-TR-823, Purdue University Department of Computer
Science, 1988.
- Spa89
-
Eugene H. Spafford.
The Internet Worm: Crisis and aftermath.
Communications of the ACM, 32(6):678-687, 1989.
- Spa90
-
Eugene H. Spafford.
Are computer hacker break-ins ethical?
Technical Report CSD-TR-994, Purdue University, Julio 1990.
- Spa91a
-
Eugene H. Spafford.
The Internet Worm incident.
Technical Report CSD-TR-933, Purdue University Department of Computer
Science, 1991.
- Spa91b
-
Eugene H. Spafford.
OPUS: Preventing weak password choices.
In Proceedings of the 14th National Computer Security
Conference, pages 446-455, Octubre 1991.
- Spi01a
-
Lance Spitzner.
Intrusion Detection for Check Point FireWall-1.
http://www.enteract.com/~lspitz/intrusion.html, Diciembre 2001.
- Spi01b
-
Lance Spitzner.
Know your enemy: Honeynets.
http://project.honeynet.org/papers/honeynet/, 2001.
- Spr01
-
Ian P. Springer.
HP-UX FAQ, Noviembre 2001.
http://www.faqs.org/faqs/hp/hpux-faq/.
- Sta00
-
British Standard.
Information technology - Code of practice for information security
management.
Technical Report BS ISO/IEC 17799:2000, British Standard Publishing
Limited, Diciembre 2000.
- Ste90
-
W. Richard Stevens.
Unix Network Programming.
Prentice Hall, 1990.
- Ste94
-
W. Richard Stevens.
TCP/IP Illustrated Volume I: The Protocols.
Addison Wesley, 1994.
- Ste98a
-
Ingo Stengel.
Security architectures based on active firewall components, 1998.
FH-Darmstadt.
- Ste98b
-
Kevin Steves.
Building a bastion host using HP-UX 10.
http://people.hp.se/stevesk/bastion10.html, 1998.
- Ste00
-
Kevin Steves.
Building a bastion host using HP-UX 11.
http://people.hp.se/stevesk/bastion11.html, 2000.
- Sto88
-
Cliff Stoll.
Stalking the wily hacker.
Communications of the ACM, 31(5):484-497, Mayo 1988.
- Sto89
-
Cliff Stoll.
The Cuckoo's Egg.
Doubleday, 1989.
- Sun96
-
Aurobindo Sundaram.
An introduction to Intrusion Detection.
Crossroads: The ACM Student Magazine, 2(4), Abril 1996.
- Swi92
-
Peter Swinbank.
Electromagnetic Radiation.
In Keith M. Jackson and Jan Hruska, editors, Computer Security
Reference Book, chapter 11, pages 75-90. Butterworth-Heinemann, 1992.
- Tan91
-
Andrew Tanenbaum.
Operating Systems: Design and Implementation.
Prentice Hall, 1991.
- Tan95
-
Andrew Tanenbaum.
Distributed Operating Systems.
Prentice Hall, 1995.
- Tan96
-
Andrew Tanenbaum.
Computer Networks.
Prentice Hall, 1996.
- Tho84
-
Ken Thompson.
Refections on trusting trust.
Communications of the ACM, 27(8), Agosto 1984.
- Thu00
-
Thuull.
Anomaly Detection Systems.
2600: The Hacker Quartely, 17(3), Primavera 2000.
- Tom75
-
Raymond S. Tomlinson.
Selecting Sequence Numbers.
In Proceedings of SIGCOMM/SIGOPS Interprocess
Communication Workshop, pages 11-23. ACM, 1975.
- Tom94
-
Chris Tomlinson.
A Practical Guide to Solaris Security.
Technical report, Sun Microsystems (UK), Marzo 1994.
- Tox00
-
Bob Toxen.
Real World Linux Security: Intrusion Prevention,
Detection and Recovery.
Prentice Hall, 1st edition, 2000.
- TW93
-
G. Winfield Treese and Alec Wolman.
X through the firewall, and other applications relays.
In Proceedings of the USENIX Summer Conference. The USENIX Association, Junio 1993.
- TY82
-
Rebecca Thomas and Jean Yates.
A User Guide to the Unix System.
McGrawHill, 1982.
- V$^+$00
-
Scott Vetter et al.
IBM Certification Study Guide. AIX v4.3 System
Administration.
IBM, 2000.
IBM RedBook SG24-5129-00.
- vE85
-
Wim van Eck.
Electromagnetic Radiation from Video Display Units: An
Eavesdropping Risk?
Computers and Security, 4(4), 1985.
- Ven92
-
Wietse Venema.
TCP Wrapper: Network monitoring, access control and booby traps.
In Proceedings of the 3rd USENIX Unix Security
Symposium, pages 85-92. The USENIX Association, Septiembre 1992.
- Vic94
-
Bob Vickers.
Guide to safe X, Febrero 1994.
- vKPG97
-
Robert van Kralingen, Corien Prins, and Jan Grijpink.
Using your body as a key: legal aspects of biometrics, 1997.
- Vol97
-
Yuri Volobuev.
Playing redir games with ARP and ICMP, Septiembre 1997.
- vSS98
-
Carl van Schaik and Paul Smeddle.
A Steganographic File System Implementation for Linux.
Technical report, University of Cape Town (South Africa), Octubre
1998.
- vSTO94
-
R. G. van Schyndel, A. Z. Tirkel, and C. F. Osborne.
A digital watermark.
In International Conference on Image Processing, volume 2,
pages 86-90. IEEE, 1994.
- WA02
-
Dameon D. Welch-Abernathy.
Essential Checkpoint Firewall-1: An Installation, Configuration,
and Troubleshooting Guide.
Addison Wesley, 2002.
- WC94
-
John P. Wack and Lisa J. Carnahan.
Keeping your site comfortably secure: an introduction to Internet
Firewalls.
Technical report, National Institute of Standards and Technology
(NIST), Diciembre 1994.
Special Publication 800-10.
- WD95
-
Ira S. Winkler and Brian Dealy.
Information security technology?...Don´t rely on it. A case
study in social engineering.
In Proceedings of the 5th USENIX Unix Security Symposium.
The USENIX Association, Junio 1995.
- Wil74
-
M. J. Williamson.
Non-Secret encryption using a finite field.
Technical report, CESG, Enero 1974.
- Wil76
-
M. J. Williamson.
Thoughts on cheaper Non-Secret encryption.
Technical report, CESG, Agosto 1976.
- Won01
-
Chris Wong.
HP-UX 11i Security.
Prentice Hall, Septiembre 2001.
- Wra91a
-
J.C. Wray.
An analysis of covert timing channels.
In Proceedings of the 1991 Symposium on Research in Security and
Privacy, pages 2-7. IEEE Computer Society, Mayo 1991.
- Wra91b
-
J.W. Wray.
Toward a mathematical foundation for information flow security.
In Proceedings of the 1991 Symposium on Research in Security and
Privacy, pages 21-34. IEEE Computer Society, Mayo 1991.
- Wre98
-
Dave Wreski.
Linux Security Administrator´s Guide.
http://nic.com/~dave/Security/, 1998.
- Ylo96
-
Tatu Ylonen.
SSH - Secure login connetions over the Internet.
In Proceedings of the 6th USENIX Security Symposium,
pages 37-42. The USENIX Association, Julio 1996.
- Zie01
-
Robert L. Ziegler.
Linux Firewalls.
New Riders, 2nd edition, 2001.
- Zim95a
-
Phil Zimmermann.
The Official PGP User´s Guide.
M.I.T. Press, 1995.
- Zim95b
-
Phil Zimmermann.
PGP: Source Code and Internals.
M.I.T. Press, 1995.
Subsecciones
© 2002 Antonio Villalón Huerta