|
Литература
- Robert H'obbes' Zakon. Hobbes' Internet Timeline v2.5.
- Barry Leiner. A Brief History of the Internet.
- Gregory R. Gromov. The Roads and Crossroads of Internet's History,1996.
- Henry Edward Hardy. The History of the Net. Master's Thesis School
of Communications Grand Valley State University Allendale, MI, 1993.
- Vinton G. Cerf. The Internet Phenomenon.
- Gary Anthes. “Отец” Internet. Computer World. Москва, N 15, 1994.
Computer World.
- Morris R.T. A Weakness in the 4.2 BSD UNIX TCP/IP Software. Computing
Science Technical Report No. 117, AT&T Bell Laboratories, Murray
Hill, New Jersey, 1985.
- Dan Farmer. Shall We Dust Moscow? 18 December 1996.
- Теория и практика обеспечения информационной безопасности, под редакцией
Зегжды П.Д., Изд. “Яхтсмен”, 1996.
- Гайкович В., Першин А.. Безопасность электронных банковских систем.,
Изд. “Единая Европа”, 1994.
- Ростовцев А. Г. Элементы Криптологии, Изд. СПбГТУ
- Клименко С., Уразметов В., Internet. Среда обитания информационного
общества, Российский Центр Физико-Технической Информатики, 1995.
- U.S. Office of Technology Assessment “Information security and privacy
in network environments.”
- Bellovin S. Security Problems in the TCP/IP Protocol Suite.
- Larry Lange. 'Hack' punches hole in Microsoft NT security. EE Times,
31.03.97.
- Dan Farmer, Wietse Venema. Improving the Security of Your Site by
Breaking Into it.
- Клиффорд Столл. Яйцо кукушки.
- Mark W. Eichin, Jon A. Rochils. With Microscope and Tweezers: An
Analysis of the Internet Virus of November 1988.
- Eugene H. Spafford. The Internet Worm Program: An Analysis.
- CIAC information bulletin H-07: Sendmail SIGHUP-smtpd Vulnerability.
- CIAC information bulletin H-23: Sendmail MIME Conversion Buffer
Overrun Vulnerability.
- CIAC information bulletin H-34: Vulnerability in innd.
- Carl E. Landwehr, Alan R. Bull, John P. McDermott, and William S.Choi.
A Taxonomy of Computer Security Flaws, with Examples. Information
Technology Division, Code 5542, Naval Research Laboratory, Washington,
D.C. 20375-5337.
- Barton P. Miller и др. Fuzz Revisited: A Re-examination of the Reability
of UNIX Utilities and Services.
- Christopher Klaus. A Guide to Internet Security: Becoming an Uebercracker
and Becoming an UeberAdmin to stop Uebercrackers.
- CIAC information bulletin E-17: FTP Daemon Vulnerabilities.
- Bell Labs Computer Science Technical Report #117, February 25, 1985.
- F. B. Cohen Packet Fragmentation Attacks.
- Ping Death. http://www.sophist.demon.co.uk/ping.
Хакинг
| Главная
| Содержание
|
|