Атака из Internet

         

Литература


  • Robert H'obbes' Zakon. Hobbes' Internet Timeline v2.5.
  • Barry Leiner. A Brief History of the Internet.
  • Gregory R. Gromov. The Roads and Crossroads of Internet's History,1996.
  • Henry Edward Hardy. The History of the Net. Master's Thesis School of Communications Grand Valley State University Allendale, MI, 1993.
  • Vinton G. Cerf. The Internet Phenomenon.
  • Gary Anthes. “Отец” Internet. Computer World. Москва, N 15, 1994. Computer World.
  • Morris R.T. A Weakness in the 4.2 BSD UNIX TCP/IP Software. Computing Science Technical Report No. 117, AT&T Bell Laboratories, Murray Hill, New Jersey, 1985.
  • Dan Farmer. Shall We Dust Moscow? 18 December 1996.
  • Теория и практика обеспечения информационной безопасности, под редакцией Зегжды П.Д., Изд. “Яхтсмен”, 1996.
  • Гайкович В., Першин А.. Безопасность электронных банковских систем., Изд. “Единая Европа”, 1994.
  • Ростовцев А. Г. Элементы Криптологии, Изд. СПбГТУ
  • Клименко С., Уразметов В., Internet. Среда обитания информационного общества, Российский Центр Физико-Технической Информатики, 1995.
  • U.S. Office of Technology Assessment “Information security and privacy in network environments.”


  • Bellovin S. Security Problems in the TCP/IP Protocol Suite.
  • Larry Lange. 'Hack' punches hole in Microsoft NT security. EE Times, 31.03.97.
  • Dan Farmer, Wietse Venema. Improving the Security of Your Site by Breaking Into it.
  • Клиффорд Столл. Яйцо кукушки.
  • Mark W. Eichin, Jon A. Rochils. With Microscope and Tweezers: An Analysis of the Internet Virus of November 1988.
  • Eugene H. Spafford. The Internet Worm Program: An Analysis.
  • CIAC information bulletin H-07: Sendmail SIGHUP-smtpd Vulnerability.
  • CIAC information bulletin H-23: Sendmail MIME Conversion Buffer Overrun Vulnerability.
  • CIAC information bulletin H-34: Vulnerability in innd.
  • Carl E. Landwehr, Alan R. Bull, John P. McDermott, and William S.Choi. A Taxonomy of Computer Security Flaws, with Examples. Information Technology Division, Code 5542, Naval Research Laboratory, Washington, D.C. 20375-5337.



  • Barton P. Miller и др. Fuzz Revisited: A Re- examination of the Reability of UNIX Utilities and Services.


  • Christopher Klaus. A Guide to Internet Security: Becoming an Uebercracker and Becoming an UeberAdmin to stop Uebercrackers.


  • CIAC information bulletin E-17: FTP Daemon Vulnerabilities.


  • Bell Labs Computer Science Technical Report #117, February 25, 1985.


  • F. B. Cohen Packet Fragmentation Attacks.


  • Содержание раздела