📄 00000012.htm
字号:
Protocols and Applications -- quite good <BR>Uday O. Pabrai Vijay K. Gurbani <BR>McGraw-Hill Sept.96; $39,95US; 0-07-048215-2 357 pages; paperback <BR><A HREF="http://www.amazon.com/exec/obidos/ISBN%3D0070482152/smartbookscomA/7262-8705911-407497">http://www.amazon.com/exec/obidos/ISBN%3D0070482152/smartbookscomA/7262-8705911-407497</A> <BR> <BR>DCE Security Programming -- great <BR>Wei Hu <BR>O'Reilly & Associates <BR>Jul.95; $29.95US; 1-56592-134-8 386 pages <BR><A HREF="http://www.amazon.com/exec/obidos/ISBN%3D1565921348/smartbookscomA/7262-8705911-407497">http://www.amazon.com/exec/obidos/ISBN%3D1565921348/smartbookscomA/7262-8705911-407497</A> <BR> <BR>Securing Client/Server Computer Networks <BR>Peter T. Davis, pub McGraw Hill (1996),ISBN 0-07-015841-X <BR><A HREF="http://www.itbs.co.uk/compsec2.htm#b8">http://www.itbs.co.uk/compsec2.htm#b8</A> <BR> <BR>UNIX Network Programming W. Richard Stevens - Prentice Hall - 0139498761 <BR> <BR>Practical UNIX Programming - A Guide to Concurrency, Communication and <BR>Multithreading - Kay. A. Robbins & Steven Robbins - Prentice Hall - <BR>0134437063 <BR> <BR>UNIX System V Network Programming - Stephen A. Rago - Addison Wesley - <BR>0201563185 <BR> <BR>Internetworking with TCP/IP Vol. 2 : Design, Implementation and <BR>Internals (2/E) - <BR>Doublas E. Comer and David L. Stevens - Prentice Hall - 0131255274 <BR> <BR>The C FAQ <BR><A HREF="http://www.cs.ruu.nl/wais/html/na-dir/C-faq/faq.html">http://www.cs.ruu.nl/wais/html/na-dir/C-faq/faq.html</A> <BR> <BR>W3 Resources on WWW Security: <BR><A HREF="http://www.w3.org/Security/">http://www.w3.org/Security/</A> <BR> <BR>Safe Internet Programming News <BR>(From the folks at Princeton that highlighted problems with Java) <BR><A HREF="http://www.cs.princeton.edu/sip/News.html">http://www.cs.princeton.edu/sip/News.html</A> <BR> <BR>The Security of Static Typing with Dynamic Linking . Drew Dean, <BR>Proceedings of the Fourth ACM Conference on Computer and Communications <BR>Security, April 1997. <BR><A HREF="http://www.cs.princeton.edu/sip/pub/ccs4.html">http://www.cs.princeton.edu/sip/pub/ccs4.html</A> <BR> <BR>Provably-Secure Programming Languages for Remote Evaluation, Dennis <BR>Volpano, <BR>(in Electronic Computing Surveys and SIGPLAN Notices, 1997.) <BR><A HREF="http://www.cs.nps.navy.mil/research/languages/papers/atsc/sdcr.ps">http://www.cs.nps.navy.mil/research/languages/papers/atsc/sdcr.ps</A> <BR> <BR>A Sound Type System for Secure Flow Analysis, Dennis Volpano, Geoffrey <BR>Smith and <BR>Cynthia Irvine. (Journal of Computer Security, Vol. 4, No. 3, 1996, pp. <BR>1-21.) <BR><A HREF="http://www.cs.nps.navy.mil/research/languages/papers/atsc/jcs.ps.Z">http://www.cs.nps.navy.mil/research/languages/papers/atsc/jcs.ps.Z</A> <BR> <BR>On the Systematic Design of Web Languages, Dennis Volpano and Geoffrey <BR>Smith, <BR>(ACM Computing Surveys, Vol. 28, No. 2, June 1996, pp. 315-317) <BR><A HREF="http://www.cs.nps.navy.mil/research/languages/papers/atsc/surveys.ps.Z">http://www.cs.nps.navy.mil/research/languages/papers/atsc/surveys.ps.Z</A> <BR> <BR>J. Linn. Generic Security Service Application Program Interface. RFC <BR>1508. September <BR>1993. <BR><A HREF="ftp://archie.au/rfc/rfc1508.txt.gz">ftp://archie.au/rfc/rfc1508.txt.gz</A> <BR> <BR>M. Bishop, M. Dilger , "Checking for Race Conditions in File Access". <BR>Computing <BR>Systems 9(2) (Spring 1996), pp. 131-152. <BR><A HREF="http://seclab.cs.ucdavis.edu/papers/bd96.ps">http://seclab.cs.ucdavis.edu/papers/bd96.ps</A> <BR> <BR>C.C.W. Ko , "Execution Monitoring of Security-Critical Programs in a <BR>Distributed System: A Specification-Based Approach", Ph.D. Thesis , <BR>August 1996. <BR><A HREF="http://seclab.cs.ucdavis.edu/papers/ko96-phd-thesis.ps">http://seclab.cs.ucdavis.edu/papers/ko96-phd-thesis.ps</A> <BR> <BR>G. Fink, K. Levitt , "Property-based Testing of Privileged Programs". <BR>Proc. of the 10th <BR>Annual Computer Security Applications Conference Orlando, FL, 5-9 Dec. <BR>1994, pp. <BR>154-163. <BR><A HREF="http://seclab.cs.ucdavis.edu/papers/fl94.ps">http://seclab.cs.ucdavis.edu/papers/fl94.ps</A> <BR> <BR>An Architectural Overview of UNIX <BR>Network Security <BR>February 18, 1993 <BR>Robert B. Reinhardt <BR><A HREF="mailto:breinhar@access.digex.com">breinhar@access.digex.com</A> <BR>ARINC Research Corporation <BR>2551 Riva Road <BR>Annapolis, MD 21401 <BR><A HREF="http://www.alw.nih.gov/Security/Docs/network-security.html">http://www.alw.nih.gov/Security/Docs/network-security.html</A> <BR> <BR> <BR>Those ought to help just a little. <BR>(This has been a public service by the folks at <A HREF="http://www.gnss.com)">http://www.gnss.com)</A> <BR> <BR> <BR>Apropos of Nothing wrote: <BR>><I> </I><BR>><I> I'm looking for manuals and/or books that programming guidlines... It </I><BR>><I> would have info such as: </I><BR>><I> </I><BR>><I> Calls that fork a shell, how to work around them </I><BR>><I> Calls that can overflow a buffer, alternative calls </I><BR>><I> Etc... </I><BR>><I> </I><BR>><I> Does anyone know of such a book? </I><BR>><I> </I><BR>><I> I'm also looking for similar info for perl and shell. </I><BR>><I> </I><BR>><I> Thanks in advance, </I><BR>><I> </I><BR>><I> gabe </I><BR><CENTER><H1>BBS水木清华站∶精华区</H1></CENTER></BODY></HTML>
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -