[1] Quarterman, J., "The Matrix: Computer Networks and Conferencing Systems
Worldwide", Pg. 278, Digital Press, Bedford, MA, 1990.
- [2]
- Brand, R., "Coping with the Threat of Computer Security Incidents: A
Primer from Prevention through Recovery", R. Brand, доступна чеpез
cert.sei.cmu.edu:/pub/info/primer, 8 June 1990.
- [3]
- Fites, M., Kratz, P. and A. Brebner, "Control and Security of Computer
Information Systems", Computer Science Press, 1989.
- [4]
- Johnson, D., and J. Podesta, "Formulating a Company Policy on Access to
and Use and Disclosure of Electronic Mail on Company Computer Systems",
Доступна через: The Electronic Mail Association (EMA) 1555 Wilson Blvd, Suite
555, Arlington VA 22209, (703) 522-7111, 22 October 1990.
- [5]
- Curry, D., "Improving the Security of Your UNIX System", SRI
International Report ITSTD-721-FR-90-21, April 1990.
- [6]
- Cheswick, B., "The Design of a Secure Internet Gateway",
Proceedings of the Summer Usenix Conference, Anaheim, CA, June 1990.
- [7]
- Linn, J., "Privacy Enhancement for Internet Electronic Mail: Part I --
Message Encipherment and Authentication Procedures", RFC 1113, IAB Privacy
Task Force, August 1989.
- [8]
- Kent, S., and J. Linn, "Privacy Enhancement for Internet Electronic
Mail: Part II -- Certificate-Based Key Management", RFC 1114, IAB Privacy
Task Force, August 1989.
- [9]
- Linn, J., "Privacy Enhancement for Internet Electronic Mail: Part III
-- Algorithms, Modes, and Identifiers", RFC 1115, IAB Privacy Task Force,
August 1989.
- [10]
- Merkle, R., "A Fast Software One Way Hash Function", Journal of
Cryptology, Vol. 3, No. 1.
- [11]
- Postel, J., "Internet Protocol - DARPA Internet Program Protocol
Specification", RFC 791, DARPA, September 1981.
- [12]
- Postel, J., "Transmission Control Protocol - DARPA Internet Program
Protocol Specification", RFC 793, DARPA, September 1981.
- [13]
- Postel, J., "User Datagram Protocol", RFC 768, USC/Information
Sciences Institute, 28 August 1980.
- [14]
- Mogul, J., "Simple and Flexible Datagram Access Controls for UNIX-based
Gateways", Digital Western Research Laboratory Research Report 89/4, March
1989.
- [15]
- Bellovin, S., and M. Merritt, "Limitations of the Kerberos
Authentication System", Computer Communications Review, October 1990.
- [16]
- Pfleeger, C., "Security in Computing", Prentice-Hall, Englewood
Cliffs, N.J., 1989.
- [17]
- Parker, D., Swope, S., and B. Baker, "Ethical Conflicts: Information
and Computer Science, Technology and Business", QED Information Sciences,
Inc., Wellesley, MA.
- [18]
- Forester, T., and P. Morrison, "Computer Ethics: Tales and Ethical
Dilemmas in Computing", MIT Press, Cambridge, MA, 1990.
- [19]
- Postel, J., and J. Reynolds, "Telnet Protocol Specification", RFC
854, USC/Information Sciences Institute, May 1983.
- [20]
- Postel, J., and J. Reynolds, "File Transfer Protocol", RFC 959,
USC/Information Sciences Institute, October 1985.
- [21]
- Postel, J., Editor, "IAB Official Protocol Standards", RFC 1200,
IAB, April 1991.
- [22]
- Internet Activities Board, "Ethics and the Internet", RFC 1087,
Internet Activities Board, January 1989.
- [23]
- Pethia, R., Crocker, S., and B. Fraser, "Policy Guidelines for the
Secure Operation of the Internet", CERT, TIS, CERT, RFC in preparation.
- [24]
- Computer Emergency Response Team (CERT/CC), "Unauthorized Password
Change Requests", CERT Advisory CA-91:03, April 1991.
- [25]
- Computer Emergency Response Team (CERT/CC), "TELNET Breakin
Warning", CERT Advisory CA-89:03, August 1989.
- [26]
- CCITT, Recommendation X.509, "The Directory: Authentication
Framework", Annex C.
- [27]
- Farmer, D., and E. Spafford, "The COPS Security Checker System",
Proceedings of the Summer 1990 USENIX Conference, Anaheim, CA, Pgs. 165-170,
June 1990.
|