[1] J. Quarterman -- The Matrix: Computer Networks and Conferencing Systems Worldwide -- Pg. 278, Digital Press, Bedford, MA , 1990
[2] R. Brand -- Coping with the Threat of Computer Security Incidents: A Primer from Prevention through Recovery , 1990
[3] M. Fites , A. Brebner -- Control and Security of Computer Information Systems -- Computer Science Press , 1989
[4] D. Johnson -- Formulating a Company Policy on Access to and Use and Disclosure of Electronic Mail on Company Computer Systems -- Available from: The Electronic Mail Association (EMA) 1555 Wilson Blvd, Suite 555, Arlington VA 22209, (703) 522-7111 , 22 October 1990
[5] D. Curry -- Improving the Security of Your UNIX System -- SRI International Report ITSTD-721-FR-90-21 , April 1990
[6] B. Cheswick -- The Design of a Secure Internet Gateway -- Proceedings of the Summer Usenix Conference, Anaheim, CA , June 1990
[7] J. Linn -- Privacy Enhancement for Internet Electronic Mail: Part I - Message Encipherment and Authentication Procedures -- RFC 1113, IAB Privacy Task Force , August 1989
[8] S. Kent -- Privacy Enhancement for Internet Electronic Mail: Part II — Certificate-Based Key Management -- RFC 1114, IAB Privacy Task Force , August 1989.
[9] J. Linn -- Privacy Enhancement for Internet Electronic Mail: Part III - Algorithms, Modes, and Identifiers -- RFC 1115, IAB Privacy Task Force , August 1989
[10] R. Merkle -- A Fast Software One Way Hash Function -- Journal of Cryptology, Vol. 3, #1.
[11] J. Postel -- Internet Protocol - DARPA Internet Program Protocol Specification -- RFC 791, DARPA , September 1981
[12] J. Postel -- Transmission Control Protocol - DARPA Internet Program Protocol Specification -- RFC 793, DARPA , September 1981
[13] J. Postel -- User Datagram Protocol -- RFC 768, USC/Information Sciences Institute , 28 August 1980
[14] J. Mogul -- Simple and Flexible Datagram Access Controls for UNIX-based Gateways -- Digital Western Research Laboratory Research Report 89/4 , March 1989
[15] S. Bellovin -- Limitations of the Kerberos Authentication System -- Computer Communications Review , October 1990
[16] C. Pfleeger -- Security in Computing -- Prentice-Hall, Englewood Cliffs, N.J. , 1989
[17] D. Parker , S. Swope , B. Baker -- Ethical Conflicts: Information and Computer Science, Technology and Business -- QED Information Sciences, Inc., Wellesley, MA
[18] T. Forester -- Computer Ethics: Tales and Ethical Dilemmas in Computing -- MIT Press, Cambridge, MA , 1990
[19] J. Postel -- Telnet Protocol Specification -- RFC 854, USC/Information Sciences Institute , May 1983
[20] J. Postel -- File Transfer Protocol -- RFC 959, USC/Information Sciences Institute , October 1985
[21] J. Postel (ред.) -- IAB Official Protocol Standards -- RFC 1200, IAB , April 1991
[22] Internet Activities Board -- Ethics and the Internet -- RFC 1087, Internet Activities Board , January 1989
[23] R. Pethia , S. Crocker , B. Fraser -- Policy Guidelines for the Secure Operation of the Internet -- CERT, TIS, CERT, RFC , in preparation
[24] Computer Emergency Response Team (CERT/CC) -- Unauthorized Password Change Requests -- CERT Advisory CA-91:03 , April 1991
[25] Computer Emergency Response Team (CERT/CC) -- TELNET Breakin Warning -- CERT Advisory CA-89:03 , August 1989
[26] CCITT, Recommendation X.509 -- The Directory: Authentication Framework -- Annex C.
[27] D. Farmer -- The COPS Security Checker System -- Proceedings of the Summer 1990 USENIX Conference, Anaheim, CA, Pgs. 165-170 , June 1990
![]() |
![]() |
|
Авторы | Содержание |
Copyright ╘ 1993-2000, Jet Infosystems |