Next: Appendix A
Up: SysHackAdminer : Overcoming host
Previous: 9.3 Concluding remarks
- 1
- Alexander, Michael The Underground Guide to Computer Security:
Slightly Askew Advice on Protecting Your PC and What's On It, Addison-Wesley,
1996
- 2
- Anonymous Maximum Security - A Hacker's Guide to Protecting Your
Internet Site and Network, Sams.net, First Edition, 1997
- 3
- Bellovin, S. M. Security Problems in the TCP/IP Protocol Suite, Computer
Communication Review, 19(2), pp 32-48 (April 1989)
- 4
- Bishop, Matt How to Write a Setuid Program, Research Institute
for Advanced Computer Science, NASA Ames Research Center. http://www.rootshell.com/docs
- 5
- Claerhout Brecht A short overview of IP Spoofing: Part II - Advanced
Spoofing (Blind), By coder@reptile.rug.ac.be, 1996-7
- 6
- Chapman, D., Zwicky, E. Building Internet Firewalls, O'Reilly
& Associates, Inc, 1995
- 7
- Cheswick, W., Bellovin, S. Firewalls and Internet Security : Repelling
the Wily Hacker, Addison-Wesley, 1994
- 8
- Denning, Peter J. Sending a Signal, Communications
of the ACM, 33 (8), pp 11-13 (July 1990)
- 9
- Eisenberg, T. et al The Cornell Commission : On Morris and
the Worm, Communications of the ACM, 32 (6), pp 706-709 (June
1989)
- 10
- Farber, David J. NSF Poses Code of Networking Ethics, Computers
Under Attack: Intruders, Worms, and Viruses, Edited by Peter J. Denning, Article
35, ACM Press, 1990
- 11
- Farmer D., Venema W. Improving the security of your system by
breaking into it . http://www.rootshell.com/docs
- 12
- Garfinkel S., Spafford, Eugene H. Practical Unix Security, O'Reilly
& Associates, Inc, 1992
- 13
- Hess, David K. A Unix Network Protocol
Security Study: Network Information Service, Texas A&M University. By dhess@cs.tamu.edu
- 14
- Joncheray, Laurent A Simple Active Attack Against TCP, Merit
Network, Inc, April 24, 1995
- 15
- Klaus, Christopher Backdoors, August 1997. http://www.rootshell.com/docs
- 16
- Kostick, C., Mancuso, M. Firewall Performance Analysis Report,
Computer Sciences Corporation, 10 August 1995. http://www.rootshell.com/docs
- 17
- Kwatsha, S. Kernel Breaking: How to destroy your machine through
Linux Kernel Modules, 1998. ftp://gauntlet.ru.ac.za/pub/kernel
- 18
- Levy, Steven Hackers: Heroes of the Computer Revolution, Anchor
Press/Doubleday, 1984
- 19
- Maimon, Uriel Port Scanning without the SYN flag, Phrack
Magazine, 7(49), File 15 of 16 (November 1996). http://www.phrack.com
- 20
- Montz, Lynn B. The Worm Case: From Indictment to Verdict, Computers
Under Attack: Intruders, Worms and Viruses, Edited by Peter J. Denning, Article
15, ACM Press, 1990
- 21
- One, Aleph Smashing The Stack For Fun And Profit, Phrack
Magazine, 7(49), File 14 of 16 (November 1996). http://www.phrack.com
- 22
- Russell, D., Gangemi, G. T. (Sr.) Computer Security Basics,
O'Reilly & Associates, Inc, July 1992
- 23
- Santifaller, Michael TCP/IP and NFS: Internetworking in a Unix
(tm) Environment (translated by Stephen S. Wilson), Addison-Wesley, 1991
- 24
- Shostack, Adam Security Code Review Guidelines, February 1998.
http://www.homeport.org/~adam/review.html
- 25
- Singer, Peter Practical Ethics, Cambridge University Press,
Cambridge, 1981
- 26
- Spafford, Eugene H. Are Computer Hacker Break-ins Ethical ?,
Purdue Technical Report CSD-TR-994, April 1991. http://www.cs.purdue.edu/coast/coast-library.html
- 27
- Spafford, Eugene H. Crisis and Aftermath, Communications
of the ACM, 32 (6), pp 678-687 (June 1989)
- 28
- Stallman, Richard M. Are Computer Property Rights Absolute?, Computers
Under Attack: Intruders, Worms, and Viruses, Edited by Peter J. Denning, Article
23, ACM Press, 1990
- 29
- Stevens, W. Richard Unix Network Programming, Prentice Hall,
1990
- 30
- Stoll, Clifford The Cuckoo's Egg: Tracking a Spy through the Maze
of Computer Espionage, Pan Books, 1991
- 31
- Tanenbaum, Andrew S. Computer Networks, Third Edition, Prentice
Hall, 1996
- 32
- Thiroux, Jacques P. Ethics: theory and practice, Glencoe Press,
1977
- 33
- Volobuev, Yuri Playing redir games with ARP and ICMP, By volobuev@t1.chem.umn.edu,
1997
- 34
- de Vivo, M., de Vivo G., Isern, G. Internet Security Attacks at the
Basic Levels, Operating Systems Review, pp 4-15, April 1998
Shaun Bangay
1998-11-19