apa.htm
来自「Maximum Security (First Edition) 网络安全 英文」· HTM 代码 · 共 1,435 行 · 第 1/5 页
HTM
1,435 行
Dr. Dobb's Journal</I>. Volume 16, p. 49. January 1, 1991.</P><P><B>"Dyad: A System for Using Physically Secure Coprocessors."</B> Dr.(Professor) J. Douglas Tygar and Bennet Yee, School of Computer Science at CarnegieMellon University.<UL> <LI><A HREF="http://www.cni.org/docs/ima.ip-workshop/www/Tygar.Yee.html"><TT>http://www.cni.org/docs/ima.ip-workshop/www/Tygar.Yee.html</TT></A></UL><P><B>"Evolution of a Trusted B3 Window System Prototype."</B> J. Epstein,J. McHugh, R. Psacle, C. Martin, D. Rothnie, H. Orman, A. Marmor-Squires, M. Branstad,and B. Danner. In proceedings of the 1992 IEEE Symposium on Security and Privacy,1992.</P><P><B>"Features of the Centri Firewall."</B> Centri firewall information.<UL> <LI><A HREF="http://www.gi.net/security/centrifirewall/features.html"><TT>http://www.gi.net/security/centrifirewall/features.html</TT></A></UL><P><B>"Firewall Application Notes."</B> Good document that starts by describinghow to build a firewall. Also addresses application proxies, sendmail in relationto firewalls, and the characteristics of a bastion host. Livingston Enterprises,Inc.<UL> <LI><A HREF="http://www.telstra.com.au/pub/docs/security/firewall-1.1.ps.Z"><TT>http://www.telstra.com.au/pub/docs/security/firewall-1.1.ps.Z</TT></A></UL><P><B>"Firewall Performance Measurement Techniques: A Scientific Approach."</B>Marcus Ranum. February 4, 1996 (last known date of modification).<UL> <LI><A HREF="http://www.v-one.com/pubs/perf/approaches.htm"><TT>http://www.v-one.com/pubs/perf/approaches.htm</TT></A></UL><P><B>Firewalls and Internet Security : Repelling the Wily Hacker.</B> William R.Cheswick and Steven M. Bellovin. Addison-Wesley Professional Computing. ISBN: 0-201-63357-4.1994.</P><P><B>Firewalls FAQ.</B> Marcus J. Ranum.<UL> <LI><A HREF="http://www.cis.ohio-state.edu/hypertext/faq/usenet/firewalls-faq/faq.html"><TT>http://www.cis.ohio-state.edu/hypertext/faq/usenet/firewalls-faq/faq.html</TT></A></UL><P><B>"Five Reasons Why an Application Gateway is the Most Secure Firewall."</B>Global Internet.<UL> <LI><A HREF="http://www.gi.net/security/centrifirewall/fivereasons.html"><TT>http://www.gi.net/security/centrifirewall/fivereasons.html</TT></A></UL><P><B>"Group of 15 Firewalls Hold Up Under Security Scrutiny."</B> StephenLawson. <I>InfoWorld</I>. June 1996.<UL> <LI><A HREF="http://www.infoworld.com/cgi-bin/displayStory.pl?96067.firewall.htm"><TT>http://www.infoworld.com/cgi-bin/displayStory.pl?96067.firewall.htm</TT></A></UL><P><B>"If You Can Reach Them, They Can Reach You."</B> William Dutcher.A PC Week Online Special Report. June 19, 1995.<UL> <LI><A HREF="http://www.pcweek.com/sr/0619/tfire.html"><TT>http://www.pcweek.com/sr/0619/tfire.html</TT></A></UL><P><B>"Improving the Security of Your Site by Breaking Into It."</B> DanFarmer and Wietse Venema. 1995.<UL> <LI><A HREF="http://www.craftwork.com/papers/security.html"><TT>http://www.craftwork.com/papers/security.html</TT></A></UL><P><B>"Improving X Windows Security." </B>Linda Mui. <I>UNIX World</I>.Volume IX, Number 12. December 1992.</P><P><B>"Integrating Security in a Group Oriented Distributed System."</B>Michael K. Reiter, Kenneth P. Birman, and Li Gong. TR92-1269. February 1992.<UL> <LI><A HREF="http://cs-tr.cs.cornell.edu:80/Dienst/Repository/2.0/Body/ncstrl.cornell%2fTR92-1269/postscript"><TT>http://cs-tr.cs.cornell.edu:80/Dienst/Repository/2.0/Body/ncstrl.cornell%2fTR92-1269/postscript</TT></A></UL><P><B>"Internet Firewalls: An Introduction."</B> Firewall white paper.NMI Internet Expert Services.<UL> <LI><A HREF="http://www.netmaine.com/netmaine/whitepaper.html"><TT>http://www.netmaine.com/netmaine/whitepaper.html</TT></A></UL><P><B>Internet Firewalls and Network Security (Second Edition).</B> New Riders. ChrisHare and Karanjit Siyan. ISBN: 1-56205-632-8. 1996.</P><P><B>Internet Security Resource Library: Internet Firewalls and Network Security,Internet Security Techniques, Implementing Internet Security.</B> New Riders. ISBN:1-56205-506-2. 1995.</P><P><B>"Intrusion Protection for Networks 171."</B> <I>Byte</I> <I>Magazine</I>.April, 1995.</P><P><B>"IP v6 Release and Firewalls."</B> Uwe Ellermann. 14th WorldwideCongress on Computer and Communications Security Protection. pp. 341-354. June 1996.</P><P><B>"Is Plan 9 Sci-Fi or UNIX for the Future?"</B> Anke Goos. <I>UNIXWorld</I>. Volume 7, p. 61. October 1, 1990.</P><P><B>"Keeping Your Site Comfortably Secure: An Introduction to Internet Firewalls."</B>John P. Wack and Lisa J. Carnahan. National Institute of Standards and Technology.February 9, 1995.<UL> <LI><A HREF="http://csrc.ncsl.nist.gov/nistpubs/800-10/"><TT>http://csrc.ncsl.nist.gov/nistpubs/800-10/</TT></A></UL><P><B>"Making Your Setup More Secure."</B> NCSA tutorial pages.<UL> <LI><A HREF="http://hoohoo.ncsa.uiuc.edu/docs/tutorials/security.html"><TT>http://hoohoo.ncsa.uiuc.edu/docs/tutorials/security.html</TT></A></UL><P><B>"Multilevel Security in the UNIX Tradition."</B> M. D. McIlroy andJ. A. Reeds. <I>SWPE</I>. 22(8), pp. 673-694. 1992.</P><P><B>"NCSA Firewall Policy Guide."</B> Compiled by Stephen Cobb, Directorof Special Projects. National Computer Security Association.<UL> <LI><A HREF="http://www.ncsa.com/fwpg_p1.html"><TT>http://www.ncsa.com/fwpg_p1.html</TT></A></UL><P><B>"Network Firewalls."</B> Steven M. Bellovin and William R. Cheswick.IEEECM, 32(9), pp. 50-57. September 1994.</P><P><B>"Networks Without User Observability: Design Options."</B> AndreasPfitzmann and Michael Waidner. Eurocrypt '85, LNCS 219, Springer-Verlag, Berlin 1986,245-253.<UL> <LI><A HREF="http://www.informatik.uni-hildesheim.de/FB4/Projekte/sirene/publ/PfWa_86anonyNetze.html"><TT>http://www.informatik.uni-hildesheim.de/FB4/Projekte/sirene/publ/PfWa_86anonyNetze.html</TT></A></UL><P><B>"On Access Checking in Capability-Based Systems."</B> Richard Y.Kain and C. E. Landwehr. IEEE Trans. on Software Engineering Volume SE-13, Number2 (Feb. 1987) pp. 202-207; reprinted from Proc. 1986 IEEE Symposium on Security andPrivacy, April, 1986, Oakland, CA.<UL> <LI><A HREF="http://www.itd.nrl.navy.mil/ITD/5540/publications/CHACS/Before1990/1987landwehr-tse.ps"><TT>http://www.itd.nrl.navy.mil/ITD/5540/publications/CHACS/Before1990/1987landwehr-tse.ps</TT></A></UL><P><B>"On the (In)Security of the Windowing System X."</B> Marc VanHeyningen.Indiana University. September 14, 1994.<UL> <LI><A HREF="http://www.cs.indiana.edu/X/security/intro.html"><TT>http://www.cs.indiana.edu/X/security/intro.html</TT></A></UL><P><B>"Packet Filtering for Firewall Systems."</B> February 1995. CERT(and Carnegie Mellon University).<UL> <LI><A HREF="ftp://info.cert.org/pub/tech_tips/packet_filtering"><TT>ftp://info.cert.org/pub/tech_tips/packet_filtering</TT></A></UL><P><B>"Packets Found on an Internet."</B> Steven M. Bellovin. Interestinganalysis of packets appearing at the application gateway of AT&T. Lambda. August23, 1993.<UL> <LI><A HREF="ftp://ftp.research.att.com/dist/smb/packets.ps"><TT>ftp://ftp.research.att.com/dist/smb/packets.ps</TT></A></UL><P><B>"Password Security: A Case History."</B> Robert Morris and Ken Thompson.<UL> <LI><A HREF="http://www.sevenlocks.com/papers/password/pwstudy.ps"><TT>http://www.sevenlocks.com/papers/password/pwstudy.ps</TT></A></UL><P><B>PCWEEK Intranet and Internet Firewall Strategies.</B> Ed Amoroso and Ron Sharp.Ziff-Davis Press. ISBN: 1562764225. 1996.</P><P><B>"Plan 9."</B> Sean Dorward, Rob Pike, and Dave Presotto. <I>UNIXReview</I>. Volume 10, p. 28. April 1, 1992.</P><P><B>"Plan 9: Feature Film to Feature-Rich OS."</B> Paul Fillinich. <I>Byte</I><I>Magazine</I>. Volume 21, p. 143. March 1, 1996.</P><P><B>"Plan 9 from AT&T."</B> David Bailey. <I>UNIX Review</I>. Volume1, p. 27. January 1, 1996.</P><P><B>"Plan 9 from Bell Labs."</B> Rob Pike, Dave Presotto, and Phil Winterbottom.<I>Computing Systems Journal</I>. Volume 8, p. 221. Summer, 1995.</P><P><B>"Plan 9: Son of UNIX."</B> Robert Richardson. <I>LAN Magazine</I>.Volume 11, p. 41. August 1, 1996.</P><P><B>"Private Communication Technology Protocol."</B> Daniel Simon. April1996.</P><P><B>"Product Overview for IBM Internet Connection Secured Network Gatewayfor AIX, Version 2.2."</B> IBM firewall information.<UL> <LI><A HREF="http://www.ics.raleigh.ibm.com/firewall/overview.htm"><TT>http://www.ics.raleigh.ibm.com/firewall/overview.htm</TT></A></UL><P><B>"Program Predictability and Data Security."</B> Charles G. MooreIII and Richard W. Conway. TR74-212.<UL> <LI><A HREF="http://cs-tr.cs.cornell.edu:80/Dienst/UI/2.0/Describe/ncstrl.cornell%2fTR74-212?abstract=Security"><TT>http://cs-tr.cs.cornell.edu:80/Dienst/UI/2.0/Describe/ncstrl.cornell%2fTR74-212?abstract=Security</TT></A></UL><P><B>"Protecting the Fortress From Within and Without."</B> R. Scott Raynovich.<I>LAN Times</I>. April 1996.<UL> <LI><A HREF="http://www.wcmh.com/lantimes/96apr/604c051a.html"><TT>http://www.wcmh.com/lantimes/96apr/604c051a.html</TT></A></UL><P><B>"Rating of Application Layer Proxies."</B> Michael Richardson. November13, 1996.<UL> <LI><A HREF="http://www.sandelman.ottawa.on.ca/SSW/proxyrating/proxyrating.html"><TT>http://www.sandelman.ottawa.on.ca/SSW/proxyrating/proxyrating.html</TT></A></UL><P><B>"Reducing the Proliferation of Passwords in Distributed Systems InformationProcessing."</B> <I>Education and Society</I>. Volume II, pp. 525-531. ElsevierScience Publishers B.V. (North Holland). 1992.</P><P><B>"Robust and Secure Password/Key Change Method Proceedings of the ThirdEuropean Symposium on Research in Computer Security (ESORICS)."</B> Ralf Hauser,Phil Janson, Refik Molva, Gene Tsudik, and Els Van Herreweghen. LNCS, pp. 107-122,SV, November 1994.</P><P><B>"Secure Computing Firewall for NT."</B> Overview. Secure Computing.<UL> <LI><A HREF="http://www.sctc.com/NT/HTML/overview.html"><TT>http://www.sctc.com/NT/HTML/overview.html</TT></A></UL><P><B>"Security and the X Window System."</B> Dennis Sheldrick. <I>UNIXWorld</I>. 9(1), p. 103. January 1992.<UL> <LI><A HREF="http://ftp.digital.com/pub/Digital/info/SPD/46-21-XX.txt"><TT>http://ftp.digital.com/pub/Digital/info/SPD/46-21-XX.txt</TT></A></UL><P><B>"Security in Public Mobile Communication Networks."</B> Hannes Federrath,Anja Jerichow, Dogan Kesdogan, and Andreas Pfitzmann. Proceedings of the IFIP TC6 International Workshop on Personal Wireless Communications, Prague 1995, pp. 105-116.<UL> <LI><A HREF="http://www.informatik.uni-hildesheim.de/FB4/Projekte/sirene/publ/FJKP_95FunkEngl.ps.gz"><TT>http://www.informatik.uni-hildesheim.de/FB4/Projekte/sirene/publ/FJKP_95FunkEngl.ps.gz</TT></A></UL><P><B>"Security in Open Systems."</B> (NIST) John Barkley, editor (withLisa Carnahan, Richard Kuhn, Robert Bagwill, Anastase Nakassis, Michael Ransom, JohnWack, Karen Olsen, Paul Markovitz, and Shu-Jen Chang). U.S. Department of Commerce.Section: The X Window System: Bagwill, Robert.<UL> <LI><A HREF="http://csrc.ncsl.nist.gov/nistpubs/800-7/node62.html#SECTION06200000000000000000"><TT>http://csrc.ncsl.nist.gov/nistpubs/800-7/node62.html#SECTION06200000000000000000</TT></A></UL><P><B>"Security in the X11 Environment."</B> Pangolin. University of Bristol,UK. January, 1995.<UL> <LI><A HREF="http://sw.cse.bris.ac.uk/public/Xsecurity.html"><TT>http://sw.cse.bris.ac.uk/public/Xsecurity.html</TT></A></UL><P><B>"Selective Security Capabilities in ASAP--A File Management System."</B>Richard W. Conway, W. L. Maxwell, and Howard L. Morgan. TR70-62. June 1970.<UL> <LI><A HREF="http://cs-tr.cs.cornell.edu:80/Dienst/UI/2.0/Print/ncstrl.cornell%2fTR70-62"><TT>http://cs-tr.cs.cornell.edu:80/Dienst/UI/2.0/Print/ncstrl.cornell%2fTR70-62</TT></A></UL><P><B>"Session-Layer Encryption."</B> Matt Blaze and Steve Bellovin. Proceedingsof the Usenix Security Workshop, June 1995.</P><P><B>"Site Security Handbook."</B> Update and Idraft version; June 1996,CMU. Draft-ietf-ssh-handbook-03.txt. Barbara Fraser.<UL> <LI><A HREF="http://www.internic.net/internet-drafts/draft-ietf-ssh-handbook-03.txt"><TT>http://www.internic.net/internet-drafts/draft-ietf-ssh-handbook-03.txt</TT></A></UL><P><B>"SQL*Net and Firewalls."</B> David Sidwell and Oracle Corporation.<UL> <LI><A HREF="http://www.zeuros.co.uk/firewall/library/oracle-and-fw.pdf"><TT>http://www.zeuros.co.uk/firewall/library/oracle-and-fw.pdf</TT></A></UL><P><B>"Talking Securely."</B> Mark Arnold, Anthony Boyd, Susan Dalton,Flora Lo, Adam Millard, and Shalini Shah.1994.<UL> <LI><A HREF="http://julmara.ce.chalmers.se/Security/sectalk.ps.Z"><TT>http://julmara.ce.chalmers.se/Security/sectalk.ps.Z</TT></A></UL><P><B>"TCP WRAPPER: Network Monitoring, Access Control, and Booby Traps."</B>Wietse Venema. Proceedings of the Third Usenix UNIX Security Symposium, p. 85-92,Baltimore, MD. September 1
⌨️ 快捷键说明
复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?