Атака на Internet
Шрифт:
18. CIAC information bulletin E-17: FTP Daemon Vulnerabilities. http:// ciac.llnl.gov/ciac/bulletins/e-17.shtml.
19. CIFS: Common Insecurities Fail Scrutiny, 1997.
20. Cohen F. B. Packet Fragmentation Attacks. TCP/IP networks Source: http://all.net.
21. Eichin M. W., Rochils J. A. With Microscope and Tweezers: An Analysis of the Internet Virus of November, 1988.
22. Farmer D., Venema W. Improving the Security of Your Site by Breaking Into it. ftp://ftp.porcupine.org/pub/security/admin-guide-to-cracking. 101.Z, 1993.
23. Garfinkel S., Spafford G. Practical UNIX Security. O\'Reily&Associates Inc., 1994.
24. Gundavaram S. CGI Programming on the World Wide Web. O\'Reily&Associates, 1996.
25. Howard J. D. An Analysis of Security Incidents on the Internet. Pittsburgh, Pennsylvania, 15213 USA, 1997.
26. Klaus C. A Guide to Internet Security: Becoming an Uebercracker and Becoming an UeberAdmin to stop Uebercrackers.1993.
27. Landwehr C. E., Bull A. R., McDermott J. P., and Choi W. S. A Taxonomy of Computer Security Flaws, with Examples. Information Technology Division, Code 5542, Naval Research Laboratory, Washington, D.C. 20375-5337.
28. Lange L.
29. Miller B. P. Fuzz Revisited: A Re-examination of the Reability of UNIX Utilities and Services. CS-TR-95-1268, April 1995.
30. Morris R. T. A Weakness in the 4.2 BSD UNIX TCP/IP Software. Computing Science Technical Report No. 117, AT&T Bell Laboratories, Murray Hill, New Jersey, 1985.
31. Ranum M. J. A Taxonomy of Internet Attacks.1997.
32. Spafford E. H. The Internet Worm Program: An Analysis. ftp://coast.cs.purdue.edu/pub/doc/morris_worm/spaf-IWorm-paper-CCR.ps.Z.
33. The World Wide Web Security FAQ by Lincoln D. Stein. http://www.w3.org/Security/Faq/.
34. Wall L., Christiansen T., Schwartz R. Programming Perl. O\'Reily&Associates, 1996.