apa.htm

来自「Maximum Security (First Edition) 网络安全 英文」· HTM 代码 · 共 1,435 行 · 第 1/5 页

HTM
1,435
字号
<UL>	<LI><A HREF="http://www.isse.gmu.edu/~csis/publication.html"><TT>http://www.isse.gmu.edu/~csis/publication.html</TT></A></UL><P><B>SRI International.</B> This site boasts some very highbrow technical information.The technical reports here are of extreme value. However, you must have at leasta fleeting background in security to even grasp some of the concepts.<UL>	<LI><A HREF="http://www.sri.com/"><TT>http://www.sri.com/</TT></A></UL><P><B>The Security Reference Index.</B> This site, maintained by the folks at telstra.com,is a comprehensive pointer page to many security resources.<UL>	<LI><A HREF="http://www.telstra.com.au/info/security.html"><TT>http://www.telstra.com.au/info/security.html</TT></A></UL><P><B>Wietse Venema's Tools Page.</B> This page, maintained by Wietse Venema (co-authorof SATAN, author of TCP_Wrapper and many other security tools), is filled with papers,tools, and general information. It is a must-visit for any UNIX system administrator.<UL>	<LI><A HREF="ftp://ftp.win.tue.nl/pub/security/index.html"><TT>ftp://ftp.win.tue.nl/pub/security/index.html</TT></A></UL><H3><FONT COLOR="#000077"><B>Books, Reports, and Publications</B></FONT></H3><P><B>United States. Congress. House. Committee on Science, Space, and Technology.Subcommittee on Science.</B></P><P><B>Internet security: Hearing Before the Subcommittee on Science of the Committeeon Science, Space, and Technology.</B> U.S. House of Representatives, One HundredThird Congress, second session, March 22, 1994. Washington. U.S. G.P.O. For saleby the U.S. G.P.O., Supt. of Docs., Congressional Sales Office, 1994.</P><P><B>An Interactive Guide to the Internet.</B> Que Education and Training. J. MichaelBlocher, Vito Amato, and Jon Storslee. ISBN: 1-5757-6354-0. 1996.</P><P><B>Apache Server Survival Guide.</B> Sams.net. Manuel Alberto Ricart. ISBN: 1-57521-175-0.1996.</P><P><B>Bots and Other Internet Beasties.</B> Sams.net. Joseph Williams. ISBN: 1-57521-016-9.1996.</P><P><B>Designing and Implementing Microsoft Internet Information Server.</B> Sams.net.Weiying Chen, Sanjaya Hettihewa, Arthur Knowles, and Paolo Pappalardo. ISBN: 1-57521-168-8.1996.</P><P><B>E-Mail Security: How To Keep Your Electronic Messages Private.</B> John Wiley&amp; Sons. Bruce Schneier. ISBN: 0-471-05318-X. 1995.</P><P><B>Firewalls and Internet Security: Repelling the Wily Hacker.</B> Addison-WesleyPublishing Company. William R. Cheswick and Steven M. Bellovin. ISBN: 0-201-63357-4.1994.</P><P><B>Halting the Hacker: A Practical Guide to Computer Security.</B> Prentice Hall.Donald L. Pipkin. ISBN: 0-13-243718. 1997.</P><P><B>Internet 1997 Unleashed, Second Edition.</B> Sams.net. Jill Ellsworth, BillyBarron, et al. ISBN: 1-57521-185-8. 1996.</P><P><B>Internet Commerce.</B> New Riders. Andrew Dahl and Leslie Lesnick. ISBN: 1-56205-496-1.1995.</P><P><B>Internet Firewalls and Network Security, Second Edition.</B> New Riders. ChrisHare and Karanjit S. Siyan, Ph.D. ISBN: 1-56205-632-8. 1996.</P><P><B>Internet QuickKIT.</B> Hayden. Brad Miser. ISBN: 1-56830-240-1.</P><P><B>Internet Research Companion.</B> Que Education and Training. Geoffrey McKim.ISBN: 1-5757-6050-9. 1996.</P><P><B>Internet Security for Business. </B>John Wiley &amp; Sons. Terry Bernstein,Anish B. Bhimani, Eugene Schultz, and Carol A. Siegel. ISBN 0-471-13752-9. 1996.</P><P><B>Internet Security Professional Reference.</B> New Riders. Chris Hare, et al.ISBN: 1-56205-557-7. 1996.</P><P><B>Internet Security Resource Library (Box Set).</B> New Riders. ISBN: 1-56205-506-2.1996.</P><P><B>Linux System Administrator's Survival Guide.</B> Sams Publishing. Timothy Parker,Ph.D. ISBN: 0-672-30850-9. 1996.</P><P><B>Managing Windows NT Server 4.</B> New Riders. Howard F. Hilliker. ISBN: 1-56205-576-3.1996.</P><P><B>Microsoft Internet Information Server 2 Unleashed.</B> Sams.net. Arthur Knowles.ISBN: 1-57521-109-2. 1996.</P><P><B>NetWare Security.</B> New Riders. William Steen. ISBN: 1-56205-545-3. 1996.</P><P><B>PC Week Intranet and Internet Firewalls Strategies.</B> Ziff-Davis Press. EdAmoroso and Ronald Sharp. ISBN: 1-56276-422-5. 1996.</P><P><B>Practical UNIX &amp; Internet Security, Second Edition.</B> O'Reilly &amp;Associates. Simson Garfinkel and Gene Spafford. ISBN: 1-56592-148-8. 1996.</P><P><B>Protection and Security on the Information Superhighway.</B> John Wiley &amp;Sons. Frederick B. Cohen. ISBN: 0-471-11389-1. 1995.</P><P><B>The Internet Unleashed 1996.</B> Sams.net. Sams Development Group. ISBN: 1-57521-041-X.1995.</P><P><B>The Underground Guide to UNIX: Slightly Askew Advice from a UNIX Guru.</B>Addison-Wesley Publishing Company. John Montgomery. ISBN: 0-201-40653-5. 1995.</P><P><B>UNIX Installation Security and Integrity.</B> Prentice Hall. David Ferbracheand Gavin Shearer. ISBN: 0-13-015389-3. 1993.</P><P><B>UNIX Security: A Practical Tutorial (UNIX/C).</B> McGraw-Hill. N. Derek Arnold.ISBN: 0-07-002560-6. 1993. Contains source code for a possible UNIX virus!</P><P><B>UNIX Security for the Organization.</B> Sams Publishing. R. Bringle Bryant.ISBN: 0-672-30571-2. 1994.</P><P><B>UNIX System Security.</B> Addison-Wesley Publishing Company. David A. Curry.ISBN: 0-201-56327-4. 1992.</P><P><B>UNIX System Security Essentials.</B> Addison-Wesley Publishing Company. ChristophBraun and Siemens Nixdorf. ISBN: 0-201-42775-3. 1995.</P><P><B>UNIX System Security: How to Protect Your Data and Prevent Intruders.</B> Addison-WesleyPublishing Company. Rick Farrow. ISBN: 0-201-57030-0. 1991.</P><P><B>UNIX Unleashed.</B> Sams Publishing. Sams Development Team (Susan Peppard,Pete Holsberg, James Armstrong Jr., Salim Douba, S. Lee Henry, Ron Rose, RichardRummel, Scott Parker, Ann Marshall, Ron Dippold, Chris Negus, John Valley, Jeff Smith,Dave Taylor, Sydney Weinstein, and David Till). ISBN: 0-672-30402-3. 1994.</P><P><B>Windows NT Server 4 Security, Troubleshooting, and Optimization.</B> New Riders.ISBN: 1-56205-601-8. 1996.<H4><FONT COLOR="#000077"><B>Novell</B></FONT></H4><P><B>A Guide to NetWare for UNIX.</B> Prentice Hall. Cathy Gunn. ISBN: 0-13-300716-2.1995.</P><P><B>NetWare to Internet Gateways.</B> Prentice Hall. James E. Gaskin. ISBN: 0-13-521774-1.1996.</P><P><B>NetWare Unleashed, Second Edition.</B> Sams Publishing. Rick Sant'Angelo. 1995.</P><P><B>NetWare Web Development.</B> Sams Publishing. Peter Kuo. ISBN: 1-57521-188-6.1996.</P><P><B>Novell's Guide to Integrating NetWare and TCP/IP.</B> Novell Press/IDG Books.Drew Heywood. ISBN: 1-56884-818-8. 1996.</P><P><B>Novell's Guide to NetWare LAN Analysis.</B> Sybex. Dan E. Hakes and Laura Chappell.ISBN: 0-7821-1143-2. 1994.</P><P><B>The Complete Guide to NetWare 4.1.</B> Sybex. James E. Gaskin. ISBN: 0-7821-1500A.1995.</P><P><B>The NetWare to Internet Connection.</B> Sybex. Morgan Stern. ISBN: 0-7821-1706-6.1996.<H4><FONT COLOR="#000077"><B>Windows NT</B></FONT></H4><P><B>Inside The Windows NT File System.</B> Microsoft Press. Helen Custer. ISBN:1-55615-660-X. 1994.</P><P><B>Inside Windows NT Server 4.</B> New Riders. Drew Heywood. ISBN: 1-56205-649-2.1996.</P><P><B>Managing Windows NT Server 4.</B> New Riders. Howard Hilliker. ISBN: 1-56205-576-3.1996.</P><P><B>Microsoft Windows NT Workstation 4.0 Resource Kit.</B> Microsoft Press. ISBN:1-57231-343-9. 1996.</P><P><B>NT Server: Management and Control.</B> Prentice Hall. Kenneth L. Spencer. ISBN:0-13-107046-0. 1995.</P><P><B>Windows NT 4 Electronic Resource Kit.</B> Sams.net. ISBN: 0-67231-032-5.</P><P><B>Windows NT Administration: Single Systems to Heterogeneous Networks.</B> PrenticeHall. Marshall Brain and Shay Woodard. ISBN: 0-13-176694-5. 1994.</P><P><B>Peter Norton's Complete Guide to Windows NT 4.0 Workstation.</B> Sams Publishing.Peter Norton and John Paul Mueller. ISBN: 0-672-30-901-7. 1996.<H4><FONT COLOR="#000077"><B>General</B></FONT></H4><P><B>A Guide to Understanding Discretionary Access Control in Trusted Systems.</B>Technical Report NCSC-TG-003, National Computer Security Center, 1987.</P><P><B>A Model of Atomicity for Multilevel Transactions.</B> 1993 IEEE Computer SocietySymposium on Research in Security and Privacy; Oakland, California. Barbara T. Blaustein,Sushil Jajodia, Catherine D. McCollum, and LouAnna Notargiacomo (MITRE). USA: IEEEComputer Society Press. ISBN: 0-8186-3370-0. 1993.</P><P><B>Authentication and Discretionary Access Control.</B> Karger, Paul A. <I>Computers&amp; Security</I>, Number 5, pp. 314-324, 1986.</P><P><B>Beyond the Pale of MAC and DAC--Defining New Forms of Access Control.</B> CatherineJ. McCollum, Judith R. Messing, and LouAnna Notargiacomo. <I>SympSecPr</I>, pp. 190-200,IEEECSP, May 1990.</P><P><B>Computer Crime: A Crimefighter's Handbook.</B> O'Reilly &amp; Associates. DavidIcove, Karl Seger, and William VonStorch. ISBN: 1-56592-086-4. 1995.</P><P><B>Computer Security Basics.</B> O'Reilly &amp; Associates. Deborah Russell andG.T. Gangemi Sr. ISBN: 0-937175-71-4. 1991.</P><P><B>Computer Security: Hackers Penetrate DoD Computer Systems.</B> Testimony beforethe Subcommittee on Government Information and Regulation, Committee on GovernmentAffairs. United States Senate, Washington DC, November 1991.</P><P><B>Cyberpunk: Outlaws and Hackers on the Computer Frontier.</B> Simon and Schuster.Katie Hafner and John Markoff. ISBN: 0-671-68322-5. 1991.</P><P><B>DCE Security Programming.</B> Wei Hu. O'Reilly &amp; Associates. ISBN: 1-56592-134-8.1995.</P><P><B>Extended Discretionary Access Controls.</B> S. T. Vinter. <I>SympSecPr</I>,pp. 39-49, IEEECSP, April 1988.</P><P><B>How to Set Up and Maintain a World Wide Web Site: The Guide for InformationProviders.</B> Addison-Wesley Publishing Company. Lincoln D. Stein. ISBN: 0-201-63389-2.1995.</P><P><B>Internet Security Secrets.</B> IDG Books. John R. Vacca. ISBN: 1-56884-457-3.1996.</P><P><B>Managing Internet Information Systems.</B> O'Reilly &amp; Associates. CricketLiu, Jerry Peek, Russ Jones, Bryan Buus, and Adrian Nye. ISBN: 1-56592-051-1. 1994.</P><P><B>Microsoft's PFX: Personal Information Exchange APIs.</B> Microsoft Corporation(<TT>http://www.microsoft.com/workshop/prog/security/misf11-f.htm</TT>).</P><P><B>Network and Internetwork Security: Principles and Practice.</B> IEEE ComputerSociety Press/Prentice Hall. William Stallings. ISBN: 0-02-415483-0. 1995.</P><P><B>Network Security: How to Plan for It and Achieve It.</B> McGraw-Hill. RichardH. Baker. ISBN: 0-07-005141-0. 1994.</P><P><B>Network Security: Protocol Reference Model and The Trusted Computer SystemEvaluation Criteria.</B> M. D. Abrams and A. B. Jeng. <I>IEEE</I> <I>Network</I>,1(2), pp. 24-33, April 1987.</P><P><B>Protect Your Privacy: The PGP User's Guide.</B> Prentice Hall. William Stallings.ISBN: 0-13-185596-4. 1994.</P><P><B>Secure Databases.</B> 1993 IEEE Computer Society Symposium on Research in Securityand Privacy; Oakland, California. USA: IEEE Computer Society Press. ISBN: 0-8186-3370-0.1993.</P><P><B>Secure Networking at Sun Microsystems Inc.</B> Katherine P. Addison and JohnJ. Sancho. 11th NCSC; 1988. Baltimore. USA: NBS/NCSC: pp.212-218.</P><P><B>STRAWMAN Trusted Network Interpretation Environments Guideline. </B>MarshallAbrams, Martin W. Schwartz, and Samuel I. Schaen (MITRE). 11th NCSC; 1988 Oct 17;Baltimore. USA: NBS/NCSC: pp.194-200.<H4><FONT COLOR="#000077"><B>Java</B></FONT></H4><P><B>Briki: A Flexible Java Compiler.</B> Michael Cierniak and Wei Li. TR 621, URCSD,May 1996.<UL>	<LI><A HREF="ftp://ftp.cs.rochester.edu/pub/papers/systems/96.tr621.Briki_a_flexible_java_compiler.ps.gz"><TT>ftp://ftp.cs.rochester.edu/pub/papers/systems/96.tr621.Briki_a_flexible_java_compiler.ps.gz</TT></A></UL><P><B>Developing Intranet Applications with Java.</B> Sams.net. Jerry Ablan, WilliamRobert Stanek, Rogers Cadenhead, and Tim Evans. ISBN: 1-57521-166-1. 1996.</P><P><B>Gamelan. </B>The ultimate Java archive.<UL>	<LI><A HREF="http://www-a.gamelan.com/index.shtml"><TT>http://www-a.gamelan.com/index.shtml</TT></A></UL><P><B>H-38: Internet Explorer 3.x Vulnerability.</B> CIAC Advisory, March 4, 1997.<UL>	<LI><A HREF="http://ciac.llnl.gov/ciac/bulletins/h-38.shtml"><TT>http://ciac.llnl.gov/ciac/bulletins/h-38.shtml</TT></A></UL><P><B>Internet Java &amp; ActiveX Advisor.</B> Journal.<UL>	<LI><A HREF="http://www.advisor.com/ia.ht"><TT>http://www.advisor.com/ia.ht</TT></A></UL><P><B>Javaworld. </B>Journal.<UL>	<LI><A HREF="http://www.javaworld.com/"><TT>http://www.javaworld.com/</TT></A></UL><P><B>Java &amp; HotJava: Waking Up the Web.</B> Sean Gonz&#225;lez. <I>PC Magazine</I>,October 1995.<UL>	<LI><A HREF="http://www.zdnet.com/~pcmag/issues/1418/pcm00085.htm"><TT>http://www.zdnet.com/~pcmag/issues/1418/pcm00085.htm</TT></A></UL><P><B>Java as an Intermediate Language.</B> Technical Report, School of ComputerScience, Carnegie Mellon University, Number CMU-CS-96-161, August 1996.<UL>	<LI><A HREF="http://www.cs.cmu.edu/afs/cs.cmu.edu/project/scandal/public/papers/CMU-CS-96-161.ps.Z"><TT>http://www.cs.cmu.edu/afs/cs.cmu.edu/project/scandal/public/papers/CMU-CS-96-161.ps.Z</TT></A></UL><P><B>Java Developer's Guide.</B> Sams.net. Jamie Jaworski and Cary Jardin. ISBN:1-57521-069-X. 1996.</P><P><B>Java Developer's Journal.</B><UL>	<LI><A HREF="http://www.javadevelopersjournal.com/java/"><TT>http://www.javadevelopersjournal.com/java/</TT></A></UL><P><B>Java Developer's Reference.</B> Sams.net. Mike Cohn, Michael Morrison, BryanMorgan, Michael T. Nygard, Dan Joshi, and Tom Trinko. ISBN: 1-57521-129-7. 1996.</P><P><B>Java in a Nutshell: A Desktop Quick Reference for Java Programmers.</B> O'Reilly&amp; Associates. David Flanagan. ISBN: 1-56592-183-6. 1996.</P><P><B>Java Report.</B> Journal.<UL>	<LI><A HREF="http://www.sigs.com/jro/"><TT>http://www.sigs.com/jro/</TT></A></UL><P><B>Java Security.</B> SIGS. Gary McGraw and Edward Felten. ISBN: 1-884842-72-0.1996.</P><P><B>Java Security: From HotJava to Netscape and Beyond.</B> Drew Dean, Edward W.Felten, and Dan S. Wallach. 1996 IEEE Symposium on Security and Privacy, Oakland,CA, May 1996.</P><P><B>Java Security: Hostile Applets, Holes, &amp; Antidotes.</B> John Wiley &amp;Sons. Gary McGraw and Ed Felten. ISBN: 0-471-17842-X. 1996.</P><P><B>Java: The Inside Story.</B> Michael O'Connell. <I>Sunworld Online</I>, Volume07, July 1995.<UL>	<LI><A HREF="http://www.sun.com/sunworldonline/swol-07-1995/swol-07-java.html"><TT>http://www.sun.com/sunworldonline/swol-07-1995/swol-07-java.html</TT></A></UL><P><B>Just Java, Second Edition.</B> Sunsoft Press/Prentice Hall. Peter van der Linden.ISBN: 0-13-272303-4. 1996.</P><P><B>MIME Encapsulation of Aggregate Applet Objects</B> <B>(Mapplet).</B> A. Bahreman,J. Galvin, R. Narayanaswamy.<UL>	<LI><A HREF="http://src.doc.ic.ac.uk/computing/internet/internet-drafts/draft-bahreman-mapplet-spec-00.txt.Z"><TT>http://src.doc.ic.ac.uk/computing/internet/internet-drafts/draft-bahreman-mapplet-spec-00.txt.Z</TT></A></UL><P><B>NetProf: Network-Based High-Level Profiling of Java Bytecode.</B> SrinivasanParthasarathy, Michael Cierniak, and Wei Li. TR 622, URCSD, May 1996.<UL>	<LI><A HREF="ftp://ftp.cs.rochester.edu/pub/papers/systems/96.tr622.NetProf_network-based_high-level_profiling_of_java_bytecode.ps.gz"><TT>ftp://ftp.cs.rochester.edu/pub/papers/systems/96.tr622.NetProf_network-based_high-level_profiling_of_java_bytecode.ps.gz</TT></A></UL><P><B>The Java Handbook.</B> Osborne/McGraw-Hill. Patrick Naughton. ISBN: 0-07-882199-1.1996.</P><P><B>The Java Language Specification.</B> Addison-Wesley Publishing Company. JamesGosling, Bill Joy, and Guy Steele. ISBN: 0-201-63451-1. 1996.<H4><FONT COLOR="#000077"><B>Databases and Security</B></FONT></H4><P><B>A Personal View of DBMS Security in Database Security: Status and Prospects.</B>

⌨️ 快捷键说明

复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?