|
|
Publications
- A Weakness in the 4.2BSD Unix TCP_IP Software
- Abstract of Security Survey of Key Internet Hosts & Various Semi-Relevant Reflections
- AT&T Papers - Internet Security
- AUSCERT Information
- Bellovin on _Security Problems in the TCP_IP Protocol Suite_
- Bug in Java Security Enables Malicious Applets to Attack
- Burn It - Macworld
- Center for High Assurance Computer Systems Publications
- CERT Advisories
- CERT advisory 96.10 on default NIS+ file permissions
- CERT Technical Tips
- Common Criteria Draft
- Common Criteria, Version 1.0
- Computer Break-ins_ A Case Study
- Continuous Assessment of a Unix Configuration_ Integrating Intrusion Detection and Configuratio
- Citizens Internet Empowerment Coalition
- Cyber Whiz Makes Crime His Business
- DataSafe - CNET
- Detecting Breaches in Computer Security_ A Pragmatic System with a Logic Programming Flavor
- Earlier Security columns in SunWorld Online
- EFF Publication Archive
- Firewall Products Today (PDF)
- Firewalls-Digest V5 #20 on Sequence Number Attacks
- FIRST Archive of Security Papers
- GAO reports on computer security
- HotWired on IP Spoofing
- Information Security_ Computer Attacks at Department of Defense PoseIncreasing Risks
- Internet Explorer Security Flaw
- IPng Specifications
- It's the end of the world (as we know it)
- Java security, take two
- Kerberos_ An Authentication Service for Computer Networks
- Languages and Tools for Rule-based Intrusion Detection
- Navy Handbook for the Computer Security Certification of Trusted Systems
- Navy Publicatioins
- Oxford Security Papers
- Center for the Study of Online Communities
- PCCrypto - CNET
- Predicting How Badly 'Good' Software Can Behave
- Reviews of papers and tools
- RFC 1948_ Defending Against Sequence Number Attacks
- Security Problems in the TCP_IP Protocol Suite
- Security Risks in Key Recovery
- Sequence Number Attacs
- Site Security Handbook
- Spectre Press
- TAP vs Ident
- The Architecture and Implementation of Network-Layer Security Under UNIX
- The Group Administration Shell and the GASH Network Computing Environment
- The Revolutionaries
- Time-lock puzzles and timed-release Crypto
- UnixWorld Online_ Sequence Number Attack on Shimomura
- Unofficial Markoff, Mitnick, Shimomura FAQ
- Various papers via FTP
- Virus Scanners of the year 2000
|