Литература

[1] J. Quarterman -- The Matrix: Computer Networks and Conferencing Systems Worldwide -- Pg. 278, Digital Press, Bedford, MA , 1990

[2] R. Brand -- Coping with the Threat of Computer Security Incidents: A Primer from Prevention through Recovery , 1990

[3] M. Fites , A. Brebner -- Control and Security of Computer Information Systems -- Computer Science Press , 1989

[4] D. Johnson -- Formulating a Company Policy on Access to and Use and Disclosure of Electronic Mail on Company Computer Systems -- Available from: The Electronic Mail Association (EMA) 1555 Wilson Blvd, Suite 555, Arlington VA 22209, (703) 522-7111 , 22 October 1990

[5] D. Curry -- Improving the Security of Your UNIX System -- SRI International Report ITSTD-721-FR-90-21 , April 1990

[6] B. Cheswick -- The Design of a Secure Internet Gateway -- Proceedings of the Summer Usenix Conference, Anaheim, CA , June 1990

[7] J. Linn -- Privacy Enhancement for Internet Electronic Mail: Part I - Message Encipherment and Authentication Procedures -- RFC 1113, IAB Privacy Task Force , August 1989

[8] S. Kent -- Privacy Enhancement for Internet Electronic Mail: Part II — Certificate-Based Key Management -- RFC 1114, IAB Privacy Task Force , August 1989.

[9] J. Linn -- Privacy Enhancement for Internet Electronic Mail: Part III - Algorithms, Modes, and Identifiers -- RFC 1115, IAB Privacy Task Force , August 1989

[10] R. Merkle -- A Fast Software One Way Hash Function -- Journal of Cryptology, Vol. 3, #1.

[11] J. Postel -- Internet Protocol - DARPA Internet Program Protocol Specification -- RFC 791, DARPA , September 1981

[12] J. Postel -- Transmission Control Protocol - DARPA Internet Program Protocol Specification -- RFC 793, DARPA , September 1981

[13] J. Postel -- User Datagram Protocol -- RFC 768, USC/Information Sciences Institute , 28 August 1980

[14] J. Mogul -- Simple and Flexible Datagram Access Controls for UNIX-based Gateways -- Digital Western Research Laboratory Research Report 89/4 , March 1989

[15] S. Bellovin -- Limitations of the Kerberos Authentication System -- Computer Communications Review , October 1990

[16] C. Pfleeger -- Security in Computing -- Prentice-Hall, Englewood Cliffs, N.J. , 1989

[17] D. Parker , S. Swope , B. Baker -- Ethical Conflicts: Information and Computer Science, Technology and Business -- QED Information Sciences, Inc., Wellesley, MA

[18] T. Forester -- Computer Ethics: Tales and Ethical Dilemmas in Computing -- MIT Press, Cambridge, MA , 1990

[19] J. Postel -- Telnet Protocol Specification -- RFC 854, USC/Information Sciences Institute , May 1983

[20] J. Postel -- File Transfer Protocol -- RFC 959, USC/Information Sciences Institute , October 1985

[21] J. Postel (ред.) -- IAB Official Protocol Standards -- RFC 1200, IAB , April 1991

[22] Internet Activities Board -- Ethics and the Internet -- RFC 1087, Internet Activities Board , January 1989

[23] R. Pethia , S. Crocker , B. Fraser -- Policy Guidelines for the Secure Operation of the Internet -- CERT, TIS, CERT, RFC , in preparation

[24] Computer Emergency Response Team (CERT/CC) -- Unauthorized Password Change Requests -- CERT Advisory CA-91:03 , April 1991

[25] Computer Emergency Response Team (CERT/CC) -- TELNET Breakin Warning -- CERT Advisory CA-89:03 , August 1989

[26] CCITT, Recommendation X.509 -- The Directory: Authentication Framework -- Annex C.

[27] D. Farmer -- The COPS Security Checker System -- Proceedings of the Summer 1990 USENIX Conference, Anaheim, CA, Pgs. 165-170 , June 1990


Авторы Содержание
Copyright ╘ 1993-2000, Jet Infosystems