next up previous contents
Next: Appendix A Up: SysHackAdminer : Overcoming host Previous: 9.3 Concluding remarks

Bibliography

1
Alexander, Michael The Underground Guide to Computer Security: Slightly Askew Advice on Protecting Your PC and What's On It, Addison-Wesley, 1996

2
Anonymous Maximum Security - A Hacker's Guide to Protecting Your Internet Site and Network, Sams.net, First Edition, 1997

3
Bellovin, S. M. Security Problems in the TCP/IP Protocol Suite, Computer Communication Review, 19(2), pp 32-48 (April 1989)

4
Bishop, Matt How to Write a Setuid Program, Research Institute for Advanced Computer Science, NASA Ames Research Center. http://www.rootshell.com/docs

5
Claerhout Brecht A short overview of IP Spoofing: Part II - Advanced Spoofing (Blind), By coder@reptile.rug.ac.be, 1996-7

6
Chapman, D., Zwicky, E. Building Internet Firewalls, O'Reilly & Associates, Inc, 1995

7
Cheswick, W., Bellovin, S. Firewalls and Internet Security : Repelling the Wily Hacker, Addison-Wesley, 1994

8
Denning, Peter J. Sending a Signal, Communications of the ACM, 33 (8), pp 11-13 (July 1990)

9
Eisenberg, T. et al The Cornell Commission : On Morris and the Worm, Communications of the ACM, 32 (6), pp 706-709 (June 1989)

10
Farber, David J. NSF Poses Code of Networking Ethics, Computers Under Attack: Intruders, Worms, and Viruses, Edited by Peter J. Denning, Article 35, ACM Press, 1990

11
Farmer D., Venema W. Improving the security of your system by breaking into it . http://www.rootshell.com/docs

12
Garfinkel S., Spafford, Eugene H. Practical Unix Security, O'Reilly & Associates, Inc, 1992

13
Hess, David K. A Unix Network Protocol Security Study: Network Information Service, Texas A&M University. By dhess@cs.tamu.edu

14
Joncheray, Laurent A Simple Active Attack Against TCP, Merit Network, Inc, April 24, 1995

15
Klaus, Christopher Backdoors, August 1997. http://www.rootshell.com/docs

16
Kostick, C., Mancuso, M. Firewall Performance Analysis Report, Computer Sciences Corporation, 10 August 1995. http://www.rootshell.com/docs

17
Kwatsha, S. Kernel Breaking: How to destroy your machine through Linux Kernel Modules, 1998. ftp://gauntlet.ru.ac.za/pub/kernel

18
Levy, Steven Hackers: Heroes of the Computer Revolution, Anchor Press/Doubleday, 1984

19
Maimon, Uriel Port Scanning without the SYN flag, Phrack Magazine, 7(49), File 15 of 16 (November 1996). http://www.phrack.com

20
Montz, Lynn B. The Worm Case: From Indictment to Verdict, Computers Under Attack: Intruders, Worms and Viruses, Edited by Peter J. Denning, Article 15, ACM Press, 1990

21
One, Aleph Smashing The Stack For Fun And Profit, Phrack Magazine, 7(49), File 14 of 16 (November 1996). http://www.phrack.com

22
Russell, D., Gangemi, G. T. (Sr.) Computer Security Basics, O'Reilly & Associates, Inc, July 1992

23
Santifaller, Michael TCP/IP and NFS: Internetworking in a Unix (tm) Environment (translated by Stephen S. Wilson), Addison-Wesley, 1991

24
Shostack, Adam Security Code Review Guidelines, February 1998. http://www.homeport.org/~adam/review.html

25
Singer, Peter Practical Ethics, Cambridge University Press, Cambridge, 1981

26
Spafford, Eugene H. Are Computer Hacker Break-ins Ethical ?, Purdue Technical Report CSD-TR-994, April 1991. http://www.cs.purdue.edu/coast/coast-library.html

27
Spafford, Eugene H. Crisis and Aftermath, Communications of the ACM, 32 (6), pp 678-687 (June 1989)

28
Stallman, Richard M. Are Computer Property Rights Absolute?, Computers Under Attack: Intruders, Worms, and Viruses, Edited by Peter J. Denning, Article 23, ACM Press, 1990

29
Stevens, W. Richard Unix Network Programming, Prentice Hall, 1990

30
Stoll, Clifford The Cuckoo's Egg: Tracking a Spy through the Maze of Computer Espionage, Pan Books, 1991

31
Tanenbaum, Andrew S. Computer Networks, Third Edition, Prentice Hall, 1996

32
Thiroux, Jacques P. Ethics: theory and practice, Glencoe Press, 1977

33
Volobuev, Yuri Playing redir games with ARP and ICMP, By volobuev@t1.chem.umn.edu, 1997

34
de Vivo, M., de Vivo G., Isern, G. Internet Security Attacks at the Basic Levels, Operating Systems Review, pp 4-15, April 1998



Shaun Bangay
1998-11-19