[Avol94] Frederick Avolio and Marcus Ranum. A Network Perimeter With Secure
Internet Access. In Internet Society Symposium on Network and Distributed System
Security, pages 109-119. Internet Society, February 2-4 1994.
[Bel89] Steven M. Bellovin. Security Problems in the TCP/IP Protocol Suite.
Computer Communications Review, 9(2):32-48, April 1989.
[Cerf93] Vinton Cerf. A National Information Infrastructure. Connexions,
June 1993.
[CERT94] Computer Emergency Response Team/Coordination Center. CA-94:01,
Ongoing Network Monitoring Attacks. Available from FIRST.ORG,
pub/alerts/cert9401.txt, February 1994.
[Chap92] D. Brent Chapman. Network (In)Security Through IP Packet Filtering.
In USENIX Security Symposium III Proceedings, pages 63-76. USENIX Association,
September 14-16 1992.
[Ches94] William R. Cheswick and Steven M. Bellovin. Firewalls and Internet
Security. Addison-Wesley, Reading, MA, 1994.
[CIAC94a] Computer Incident Advisory Capability. Number e-07, unix sendmail
vulnerabilities update. Available from FIRST.ORG, file pub/alerts/e-07.txt,
January 1994.
[CIAC94b] Computer Incident Advisory Capability. Number e-09, network
monitoring attacks. Available from FIRST.ORG, pub/alerts/e-09.txt, February
1994.
[CIAC94c] Computer Incident Advisory Capability. Number e-14, wuarchive ftpd
trojan horse. Available from FIRST.ORG, pub/alerts/e-14.txt, February 1994.
[Com91a] Douglas E. Comer. Internetworking with TCP/IP: Principles,
Protocols, and Architecture. Prentice-Hall, Englewood Cliffs, NJ, 1991.
[Com91b] Douglas E. Comer and David L. Stevens. Internetworking with
TCP/IP:Design, Implementation, and Internals. Prentice-Hall, Englewood Cliffs,
NJ, 1991.
[Cur92] David Curry. UNIX System Security: A Guide for Users and System
Administrators. Addison-Wesley, Reading, MA, 1992.
[Farm93] Dan Farmer and Wietse Venema. Improving the security ofyour site by
breaking into it. Available from FTP.WIN.TUE.NL, file
/pub/security/admin-guide-to-cracking.101.Z, 1993.
[Garf92] Simpson Garfinkel and Gene Spafford. Practical UNIX Security.
O'Reilly and Associates, Inc., Sebastopol, CA, 1992.
[Haf91] Katie Hafner and John Markoff. Cyberpunk: Outlaws and Hackers on the
Computer Frontier. Simon and Schuster, New York, 1991.
[Hunt92] Craig Hunt. TCP/IP Network Administration. O'Reilly and Associates,
Inc., Sebastopol, CA, 1992.
[NIST91a] NIST. Advanced Authentication Technology. CSL Bulletin, National
Institute of Standards and Technology, November 1991.
[NIST91b] NIST. Establishing a Computer Security Incident Response
Capability. Special Publication 800-3, National Institute of Standards and
Technology, January 1991.
[NIST93] NIST. Connecting to the Internet: Security Considerations. CSL
Bulletin, National Institute of Standards and Technology, July 1993.
[NIST94a] NIST. Guideline for the use of Advanced Authentication Technology
Alternatives. Federal Information Processing Standard 190, National Institute of
Standards and Technology, September 1994.
[NIST94b] NIST. Reducing the Risk of Internet Connection and Use. CSL
Bulletin, National Institute of Standards and Technology, May 1994.
[NIST94c] NIST. Security in Open Systems. Special Publication 800-7,
National Institute of Standards and Technology, September 1994.
[Ran93] Marcus Ranum. Thinking About Firewalls. In SANS-II Conference, April
1993.
[RFC1244] Paul Holbrook and Joyce Reynolds. RFC 1244: Security Policy
Handbook. prepared for the Internet Engineering Task Force, 1991.