1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65
|
<HTML>
<HEAD>
<title>SATAN References/Bibliography</title>
<LINK REV="made" HREF="mailto:satan@fish.com">
</HEAD>
<BODY BGCOLOR="#FFFFFF">
<H2>Bibliography</H2>
<HR>
<P>
Baldwin, Robert W.,
<CITE> Rule Based Analysis of Computer Security</CITE>,
Massachusetts Institute of Technology, June 1987.
<P>
Bellovin, Steve,
<CITE> Using the Domain Name System for System Break-ins</CITE>,
1992 (unpublished).
<P>
Farmer, Dan, and Venema, Wietse,
<A HREF="admin_guide_to_cracking.html">
<CITE> Improving the Security of Your Site by Breaking Into it</CITE></A>,
comp.security.unix, December 1993.
<P>
Massachusetts Institute of Technology,
<CITE> X Window System Protocol</CITE>,
Version 11, 1990.
<P>
Shimomura, Tsutomu,
<CITE> private communication</CITE>.
<P>
Sun Microsystems,
<CITE> OpenWindows V3.0.1 User Commands</CITE>,
March 1992.
<P>
Bellovin, Steve,
<CITE> Security Problems in the TCP/IP Protocol Suite</CITE>,
Computer Communication Review 19 (2), 1989; a comment by Stephen
Kent appears in volume 19 (3), 1989.
<P>
Garfinkel, Simson and Spafford, Gene,
<CITE> Practical UNIX Security</CITE>,
O'Reilly and Associates, Inc., 1992.
<P>
Hess, David, Safford, David, and Pooch, Udo,
<CITE> A UNIX Network Protocol Study: Network Information Service</CITE>,
Computer Communication Review 22 (5) 1992.
<P>
Phreak Accident,
<CITE> Playing Hide and Seek, UNIX style</CITE>,
Phrack, Volume Four, Issue Forty-Three, File 14 of 27.
<P>
Ranum, Marcus,
<CITE> Firewalls internet electronic mailing list</CITE>,
Sept 1993.
<P>
Schuba, Christoph,
<CITE> Addressing Weaknesses in the Domain Name System Protocol</CITE>,
Purdue University, August 1993.
<P>
Thompson, Ken,
<CITE> Reflections on Trusting Trust</CITE>,
Communications of the ACM
27 (8), 1984.
</BODY>
</HTML>
|