Seguridad en Unix y Redes
Libro en Formato HTML y PDF de seguridad informática realizado por Antonio Villalon Huerta

Los contenidos pueden estar desactualizados con respecto al original

Este documento se encuentra disponible también en formato PDF

Bibliografía


next up previous contents
Siguiente: GNU Free Documentation License Subir: SEGURIDAD EN UNIX Y Anterior: Conclusiones   Índice General

Bibliografía

Age85
National Security Agency.
Magnetic Tape Degausser.
Technical Report L14-4-A, National Security Agency/Central Security Service, Octubre 1985.

AK96
Ross J. Anderson and Markus Kuhn.
Tamper resistance - a cautionary note.
In Proceedings of the 2nd USENIX Workshop on Electronic Commerce, pages 1-11. The USENIX Association, Noviembre 1996.

AKS96
Taimur Aslam, Ivan Krsul, and Eugene H. Spafford.
Use of a taxonomy of security faults.
Technical Report TR-96-051, Purdue University Department of Computer Science, 1996.

ALGJ98
Stefan Axelsson, Ulf Lindqvist, Ulf Gustafson, and Erland Jonsson.
An approach to Unix Security Logging.
In Proceedings of the 21st National Information Systems Security Conference, pages 62-75. National Institute of Standards and Technology/National Computer Security Center, Octubre 1998.

And80
James P. Anderson.
Computer security threat monitoring and surveillance.
Technical report, James P. Anderson Co., Abril 1980.

And94
Ross J. Anderson.
Why Cryptosystems Fail.
Communications of the ACM, 37:32-40, Noviembre 1994.

And97
Ross J. Anderson.
Tamperproofing of Chip Cards.
Enviado a la lista cypherpunks@cyberpass.net por William H. Geiger III en septiembre, 1997.

Ano97
Anonymous.
Maximum Security: a hacker´s guide to protecting your Internet site and network.
McMillan Computer Publishing, 1997.

Ano01
Anonymous.
Maximum Linux Security: a hacker´s guide to protecting your Linux Server and Workstation.
Sams Publishing, 2001.

ANS98
R. J. Anderson, R. M. Needham, and A. Shamir.
The Steganographic File System.
Lecture Notes in Computer Science, 1525:73-82, 1998.

Ark99
Ofir Arkin.
Network Scanning Techniques, Noviembre 1999.
PubliCom Communications Solutions.

Atk93
Derek A. Atkins.
Charon: Kerberos Extensions for Authentication over Secondary Networks.
PhD thesis, Department of Electrical Engineering and Computer Science, Massachusetts Institute of Technology, 1993.

Axe98
Stefan Axelsson.
Research in intrusion-detection systems: A survey.
Technical Report 98-17, Chalmers University of Technology, Diciembre 1998.

B$^+$85
Sheila L. Brand et al.
Department of Defense Trusted Computer System Evaluation Criteria.
Technical Report DOD 5200.28-STD, Department of Defense, Diciembre 1985.

B$^+$88
Sue Berg et al.
Glossary of Computer Security Terms.
Technical Report NCSC-TG-004, National Computer Security Center, Octubre 1988.

Bac86
Maurice J. Bach.
The Design of the Unix Operating System.
Prentice Hall, 1986.

Bai97
Edward C. Bailey.
Maximum RPM: Taking the Red Hat Package Manager to the limit.
Red Hat Software, Inc., 1997.

BAW96
F. Bouchier, J.S. Ahrens, and G. Wells.
Laboratory evaluation of the IriScan prototype biometric identifier.
Technical Report SAND96-1033, Sandia National Laboratories, Abril 1996.

BB99
Roland Büschkes and Mark Borning.
Transaction-based Anomaly Detection.
In Proceedings of Workshop on Intrusion Detection and Network Monitoring. The USENIX Association, Abril 1999.

BBD$^+$96
Michael Beck, Harold Bohme, Mirko Dzladzka, Ulrich Kunitz, Robert Magnus, and Dirk Verworner.
Linux Kernel Internals.
Addison-Wesley, 1996.

BCOW94
John Barkley, Lisa Carnahan, Karen Olsen, and John Wack.
Improving security in a network environment.
In John Barkley, editor, Security in Open Systems, chapter 10. National Institute of Standards and Technology (NIST), Julio 1994.
Special Publication 800-7.

BD96
Matt Bishop and Michael Dilger.
Checking for race conditions in file accesses.
Computing System, 9(2):131-152, Primavera 1996.

Bel89
Steven M. Bellovin.
Security problems in the TCP/IP Protocol Suite.
Computer Communications Review, 19(2):32-48, Abril 1989.

Bel92
Steven M. Bellovin.
There be dragons.
In Proceedings of the Third USENIX Security Symposium, pages 1-16. The USENIX Association, Septiembre 1992.

Bel93a
Walter Belgers.
Unix password security, 1993.

Bel93b
Steven M. Bellovin.
Packets found on an internet.
Computer Communications Review, 23(3):26-31, Julio 1993.

Bel96
Steven M. Bellovin.
RFC1498: Defending against sequence number attacks, Mayo 1996.

BF99
Dirk Balfanz and Edward W. Felten.
Hand-held computers can be better smart cards.
In Proceedings of the 8th USENIX Security Symposium. The USENIX Association, Agosto 1999.

BGML96
W. Bender, D. Gruhl, N. Morimoto, and A. Lu.
Techniques for data hiding.
IBM Systems Journal, 35(3,4), 1996.

Bha01
Nishchal Bhalla.
AIX 4.3 bastion host guidelines, Junio 2001.
The SANS Institute.

Bis86
Matt Bishop.
How to write a setuid program.
;login:, 12(1), Enero 1986.

Bis90
Matt Bishop.
A Security Analysis of the NTP Protocol, 1990.

Bis91
Matt Bishop.
A proactive password checker.
In D.T. Lindsay and W.L. Price, editors, Proceedings of the 7th International Conference on Information Security, pages 150-158, Mayo 1991.

Bis92
Matt Bishop.
Anatomy of a proactive password changer.
In Proceedings of USENIX Unix Security III. The USENIX Association, 1992.

Bis95
Matt Bishop.
Race conditions, files and security flaws; or the tortoise and the hare redux.
Technical Report CSE-95-8, University of California at Davis, 1995.

BK95
Matt Bishop and Daniel V. Klein.
Improving system security via proactive password checking.
Computers & Security, 14(3):233-249, 1995.

Bla93
Matt Blaze.
A Cryptographic File System for Unix.
In Proceedings of the 1st ACM Conference on Computer and Communications Security, pages 9-16. ACM, Noviembre 1993.

BM91
Steven M. Bellovin and Michael Merritt.
Limitations of the Kerberos Authentication System.
In Proceedings of the Winter 1991 USENIX Conference, pages 253-267. The USENIX Association, Enero 1991.

BPB00
Bill Ball, David Pitts, and William Ball.
Red Hat Linux 7 Unleashed.
Sams Publishing, 2000.

C$^+$91
Dave Curry et al.
RFC1244: Site Security Handbook.
Internet Activities Board, Julio 1991.

C$^+$98
Crispin Cowan et al.
StackGuard: automatic adaptative detection and prevention of buffer-overflow attacks.
In Proceedings of the 7th USENIX Security Symposium. The USENIX Association, Enero 1998.

CA97a
Bryan Costales and Eric Allman.
Sendmail.
O´Reilly & Associates, 2nd edition, Enero 1997.

CA97b
Bryan Costales and Eric Allman.
Sendmail Desktop Reference.
O´Reilly & Associates, Marzo 1997.

Cab96
Pino Caballero.
Introducción a la Criptografía.
Ra-Ma, 1996.

Caj82
Valentin Sanz Caja.
Vulnerabilidad y seguridad de los sistemas informáticos.
Fundación Citema, 1982.

CB94
William R. Cheswick and Steven M. Bellovin.
Firewalls and Internet Security: Repelling the wily hacker.
Addison Wesley, 1994.

CC86
D.B. Cornish and R. V. Clarke.
The Reasoning Criminal: Rational Choice Perspectives on Offending.
Springer-Verlag, 1986.

CDK94
G.F. Couloris, J. Dollimore, and T. Kindberg.
Distributed Systems. Concepts and design.
Addison Wesley, 2nd edition, 1994.

CDM97
Rémy Card, Eric Dumas, and Frack Mével.
Programación Linux 2.0: API de sistema y funcionamiento del núcleo.
Eyrolles, 1997.

Cen91
National Computer Security Center.
Data Remanence in Automated Information Systems.
Technical Report NCSC-TG-025, National Computer Security Center, Septiembre 1991.

CER99
CERT.
CERT Advisory CA-99-02. Trojan Horses.
Technical report, Computer Emergency Response Team, Marzo 1999.

CES91
CESID.
Glosario de términos de Criptología.
Centro Superior de Información de la Defensa, 1991.

CH99
Stephen Ciullo and Daniel Hinojosa.
HP-UX kernel tuning and performance guide.
http://www.hp.com/techpartners/tuning.html, 1999.

Cha92
D. Brent Chapman.
Network (In)Security through IP packet filtering.
In Proceedings of the third USENIX Security Symposium, pages 63-76. The USENIX Association, Septiembre 1992.

Che92
William R. Cheswick.
An evening with Berferd, in which a cracker is lured, endured, and studied.
In Proceedings of the Winter USENIX Conference. The USENIX Association, Enero 1992.

CHN$^+$92
Andrew Cherry, Mark W. Henderson, William K. Nickless, Robert Olson, and Gene Rackow.
Pass or fail: A new test for password legitimacy, 1992.

CHS91
Bruce Corbridge, Robert Henig, and Charles Slater.
Packet filtering in an IP router.
In Proceedings of the Fifth LISA Conference, pages 227-232. The USENIX Association, Octubre 1991.

CKL97
M. Ruschitzka C. Ko and K. Levitt.
Execution monitoring of security-critical programs in distributed systems: A specification-based approach.
In Proceedings of the 1997 IEEE Symposium on Security and Privacy, pages 175-187. IEEE Computer Society, Mayo 1997.

Coc73
C.C. Cocks.
A note on non-secret encryption.
Technical report, CESG, Noviembre 1973.

Coh84
Fred Cohen.
Computer viruses: theory and experiments.
In 7th DoD/NBS Computer Security Conference Proceedings, pages 240-263, Septiembre 1984.

Coh99
Fred Cohen.
Simulating Cyber Attacks, Defenses and Consequences.
http://all.net/journal/ntb/simulate/simulate.html, Mayo 1999.

CoIST99
National Research Council Committee on Information Systems Trustworthiness.
Trust in Cyberspace.
National Academy Press, 1999.

Com88
Apollo Computer.
Managing SysV System Software.
Technical Report 010851-A00, Apollo Computer, Inc. (Hewlett Packard), Junio 1988.

Com95
Douglas E. Comer.
Internetworking with TCP/IP. Volume 1: Principles, Protocols & Architecture.
Prentice Hall, 3rd edition, 1995.

Con99
Intrusion Detection System Consortium.
Intrusion Detection Systems buyer´s guide.
Technical report, ICSA.NET, 1999.

Cow92
Randle Cowcher.
Physical Security.
In Keith M. Jackson and Jan Hruska, editors, Computer Security Reference Book, chapter 24, pages 311-332. Butterworth-Heinemann, 1992.

CR94
Kaare Christian and Susan Richter.
The Unix Operating System.
John Wiley & Sons, 1994.

Cru00
Jeff Crume.
Inside Internet Security: What hackers don´t want you to know.
Addison Wesley, 2000.

CWP$^+$00
Crispin Cowan, Perry Wagle, Calton Pu, Steve Beattie, and Jonathan Walpole.
Buffer Overflows: Attacks and Defenses for the Vulnerability of the Decade.
In Proceedings of the SANS 2000 Conference. The SANS Institute, 2000.

CZ95
D. Brent Chapman and Elizabeth D. Zwicky.
Building Internet Firewalls.
O´Reilly & Associates, 1st edition, Noviembre 1995.

dA88
Ana Maria de Alvaré.
How crackers crack passwords, or what passwords to avoid.
Technical Report UCID-21515, Lawrence Livermore National Laboratory, Septiembre 1988.

Dae96
Daemon9.
IP-Spoofing demystified.
Phrack Magazine, 7(48), Junio 1996.

Dau97
John Daugman.
Iris recognition for personal identification, 1997.

Dau98
John Daugman.
Recognizing persons by their iris patterns.
In Biometrics: Personal Identification in Networked Society, pages 103-121. Kluwer, 1998.

Den83
Dorothy Denning.
Cryptography and Data Security.
Addison-Wesley, 1983.

Den90
P. Denning.
Computers under attack.
ACM Press, 1990.

Det01
Dethy.
Examining portscan methods - Analysing Audible Techniques, January 2001.
http://www.synnergy.net/downloads/papers/portscan.txt.

DFW96
Drew Dean, Edward W. Felten, and Dan S. Wallach.
Java Security: from HotJava to Netscape and beyond.
In Proceedings of the IEEE Symposium on Security and Privacy, 1996.

DH76
W. Diffie and M. E. Hellman.
New directions in cryptography.
IEEE Transactions on Information Theory, IT-22:644-654, Noviembre 1976.

DH77
W. Diffie and M.E. Hellman.
Exhaustive cryptanalysis of the NBS data encryption standad.
Computer, 10(6):74-84, Junio 1977.

Dik99
Casper Dik.
Solaris 2 FAQ, Octubre 1999.
ftp://ftp.wins.uva.nl/pub/solaris/.

DNO01
Vasanthan Dasan, Alex Noordergraaf, and Lou Ordorica.
The Solaris Fingerprint Database - A Security Tool for Solaris Operating Environment Files.
Sun Microsystems, Mayo 2001.
Sun BluePrints OnLine.

DP84
D. W. Davies and W. L. Price.
Security for Computer Networks: An Introduction to Data Security in Teleprocessing and Electronic Funds Transfer.
John Wiley and Sons, New York, 1984.

Duf89
Tom Duff.
Experience with viruses on UNIX systems.
In USENIX Computing Systems, volume 2, 1989.

Ell70
J. H. Ellis.
The possibility of Non-Secret digital encryption.
Technical report, CESG, Enero 1970.

ER89
M.W. Eichin and J.A. Rochlis.
With microscope and tweezers: An analysis of the Internet Virus of November 1988.
In IEEE Security and Privacy, pages 326-343, 1989.

Esc98
Terry Escamilla.
Intrusion Detection: Network Security beyond the Firewall.
John Wiley and Sons, 1998.

Eve92
David Everett.
Identity verification and biometrics.
In Keith M. Jackson and Jan Hruska, editors, Computer Security Reference Book, chapter 10, pages 37-73. Butterworth-Heinemann, 1992.

FBDW96
Edward W. Felten, Dirk Balfanz, Drew Dean, and Dan S. Wallach.
Web Spoofing: an Internet Con Game.
Technical Report 540-96, Princeton University Department of Computer Science, 1996.
Revisado en febrero de 1997.

Fen99
Carole Fennelly.
The human side of computer security.
SunWorld, Julio 1999.

Fis95
John Fisher.
Securing X Windows.
Technical Report CIAC-2316 R.0, Department of Energy Computer Incident Advisory Capability - CIAC, Agosto 1995.

FK90
David C. Feldmeirer and Philip R. Karn.
UNIX password security - ten years later.
In G. Brassard, editor, CRYPTO89, pages 44-63. Springer-Verlag, 1990.
Lecture Notes in Computer Science No. 435.

Fly00a
Hal Flynn.
Back to the Basics: Solaris and inetd.conf, Marzo 2000.
http://www.securityfocus.com/focus/sun/articles/inetd[1,2].html.

Fly00b
Hal Flynn.
Back to the Basics: Solaris default processes and init.d, part III, Junio 2000.
http://www.securityfocus.com/focus/sun/articles/b5.html.

FPA98
Dan Farmer, Brad Powell, and Matthew Archibald.
Titan.
In Proceedings of the 12th Systems Administration Conference - LISA´98. The USENIX Association, Diciembre 1998.

Fre98
Martin Freiss.
Protecting networks with SATAN.
O'Reilly & Associates, 1st edition, Mayo 1998.

Fri95
Æleen Frisch.
Essential System Administration.
O´Reilly & Associates, 1995.

Fyo98
Fyodor.
Remote OS detection via TCP/IP Stack Fingerprinting, Octubre 1998.
http://www.insecure.org/nmap/nmap-fingerprinting-article.html.

G$^+$93
Virgil D. Gligor et al.
A Guide to understanding Covert Channel Analysis of Trusted Systems.
Technical Report NCSC-TG-030, National Computer Security Center, Noviembre 1993.

Gal96a
Miguel Ángel Gallardo.
Informatoscopia y tecnología forense.
In Ámbito Jurídico de las Tecnologías de la Información. Consejo General del Poder Judicial, 1996.

Gal96b
Miguel Ángel Gallardo.
Seguridad (e inseguridad) en Java.
Seguridad en Informática y Comunicaciones, (20), Junio 1996.

Gal96c
Peter Galvin.
Controlling ACLs.
SunWorld, Agosto 1996.

Gar95
Simson Garfinkel.
PGP: Pretty Good Privacy.
O'Reilly & Associates, Enero 1995.

GB97
Barbara Guttman and Robert Bagwill.
Internet Security Policy: A Technical Guide.
Technical report, National Institute of Standards and Technology, Julio 1997.

GB99
Marcus Goncalves and Steven Brown.
Check Point Firewall-1 Administration Guide.
McGrawHill, 1999.

GC94
Berny Goodheart and James Cox.
The Magic Garden Explained: The Internals of Unix System V Release 4, an Open Systems Design.
Prentice Hall, 1994.

GKK97
Eric Guerrino, Mike Kahn, and Ellen Kapito.
User authentication and encryption overview, 1997.

GL91
T.D. Garvey and Teresa F. Lunt.
Model-based Intrusion Detection.
In Proceedings of the 14th National Computer Security Conference, pages 372-385, Octubre 1991.

Gon97
Marcus Goncalves.
Firewalls Complete.
McGrawHill, 1997.

Gra00
Robert David Graham.
Network Intrusion Detection Systems FAQ v. 0.8.3, Marzo 2000.
http://www.robertgraham.com/pubs/network-intrusion-detection.html.

Gre99
Peter H. Gregory.
Solaris Security.
Prentice Hall and Sun Microsystems Press, 1st edition, 1999.

Gre00
Mark Grennan.
Firewall and Proxy Server HOWTO.
http://www.linuxdoc.org/HOWTO/Firewall-HOWTO.html, 2000.

GS96
Simson Garfinkel and Eugene H. Spafford.
Practical Unix & Internet Security.
O'Reilly & Associates, 2nd edition, Abril 1996.

GS97
Simson Garfinkel and Eugene H. Spafford.
Web Security & Commerce.
O'Reilly & Associates, 1st edition, Junio 1997.

GSTY96
H. Gobioff, S. Smith, J.D. Tygar, and B. Yee.
Smart cards in hostile environments.
In Proceedings of the 2nd USENIX Workshop on Electronic Commerce. The USENIX Association, Noviembre 1996.

Gun96
Shishir Gundavaram.
CGI Programming on the World Wide Web.
O'Reilly & Associates, 1st edition, Marzo 1996.

GUQ92
Louis Claude Guillou, Michel Ugon, and Jean-Jacques Quisquater.
The smart card - a standardized security device dedicated to public cryptology.
In Contemporary Cryptology - The Science of Information Integrity, pages 561-614. IEEE Press, 1992.

Gut96
Peter Gutmann.
Secure deletion of data from magnetic and solid-state memory.
In Sixth USENIX Security Symposium Proceedings. The USENIX Association, Julio 1996.

H$^+$02
Pete Herzot et al.
Open-Source Security Testing Methodology Manual v2.0.
Technical report, The Ideahamster Organization, Febrero 2002.

Hal94
Neil Haller.
The S/KEY one time password system.
In Proceedings of the ISOC Symposium on network and distributed systems security, Febrero 1994.

HB96
L. Todd Heberlein and Matt Bishop.
Attack class: Address spoofing.
In Proceedings of the 19th National Information Systems Security Conference, pages 371-377, Octubre 1996.

HC83
Richard C. Hollinger and John P. Clark.
Theft by Employees.
Lexington Books, 1983.

Her00
Peter Hernberg.
User Authentication HOWTO.
http://www.tldp.org/HOWTO/User-Authentication-HOWTO/, Mayo 2000.

Hig88
H.J. Highland.
Electromagnetic Eavesdropping Machines for Christmas?
Computers and Security, 7(4), 1988.

HJAW88
Matthew S. Hecht, Abhai Johri, Radhakrishna Aditham, and T. John Wei.
Experience adding C2 Security Features to Unix.
In USENIX Conference Proceedings, pages 133-146. The USENIX Association, Verano 1988.

HLMS90
Richard Heady, George Luger, Arthur Maccabe, and Mark Servilla.
The architecture of a Network Level Intrusion Detection System.
Technical Report CS90-20, University of New Mexico, Agosto 1990.

HN$^+$99
Bao Ha, Tina Nguyen, et al.
Slackware Linux Unleashed.
Sams Publishing, 1999.

HP96
Hewlet-Packard.
Managing HP-UX software with SD-UX.
HP, Enero 1996.
HP Part Number B2355-90107.

HP00a
Hewlett-Packard.
HP-UX Patch Management: a guide to patching HP-UX 10.x systems.
Hewlett-Packard, Enero 2000.
HP Part Number B3782-90828.

HP00b
Hewlett-Packard.
Managing Systems and Workgroups: A Guide for HP-UX System Administrators.
Hewlett-Packard, 2000.
HP Part Number B2355-90701.

Hu91
W. M. Hu.
Reducing timing channels with fuzzy time.
In Proceedings of the 1991 Symposium on Research in Security and Privacy, pages 8-20. IEEE Computer Society, Mayo 1991.

Hun92
Craig Hunt.
TCP/IP Network Administration.
O´Reilly & Associates, 1992.

Huo98
Simo Huopio.
Biometric Identification.
In Seminar on Network Security: Authorization and Access Control in Open Network Environment, 1998.

HW01
Kevin J. Houle and George M. Weaver.
Trends in Denial of Service attack technology.
Technical report, CERT Coordination Center, Carnegie Mellon University, Octubre 2001.

IBM97a
IBM.
AIX Version 4.3 Problem Solving Guide and Reference.
IBM, Octubre 1997.
IBM RedBook SC23-4123.

IBM97b
IBM.
AIX Version 4.3 System Management Guide: Communication and Networks.
IBM, Octubre 1997.
IBM RedBook SC23-4127.

IBM97c
IBM.
AIX Version 4.3 System Management Guide: Operating System and Devices.
IBM, Octubre 1997.
IBM RedBook SC23-2529.

IBM00a
IBM.
AIX 4.3 Elements of Security. Effective and Efficient Implementation.
IBM, Agosto 2000.
IBM RedBook SG24-5962-00.

IBM00b
IBM.
IBM Certification Study Guide. AIX Problem Determination Tools and Techniques.
IBM, Diciembre 2000.
IBM RedBook SG24-6185-00.

Ilg92
Koral Ilgun.
USTAT: A real-time intrusion detection system for unix.
In Proceedings of the 1993 Symposium on Security and Privacy, pages 16-28. IEEE Computer Society, Mayo 1992.

Ins97
Shawn Instentes.
Stack Smashing: What to do?
;login:, 22(2), Abril 1997.

ISV95
David Icove, Karl Seger, and William VonStorch.
Computer Crime. A Crimefighter's handbook.
O'Reilly & Associates, 1995.

JF01
David W. Chapman Jr. and Andy Fox.
Cisco© Secure PIX© Firewalls.
Cisco Press, 2001.

JTY97
Philippe Janson, Gene Tsudik, and Moti Yung.
Scalability and flexibility in authentication services: The KryptoKnight Approach.
In Proceedings of INFOCOM´97. IEEE Computer Society, 1997.

JV93
Harold S. Javitz and Alfonso Valdes.
The NIDES Statistical Component: Description and Justification.
Technical report, SRI International, Marzo 1993.

Kah67
David Kahn.
The Codebreakers.
McMillan, 1967.

Kat88
J. Katz.
Seductions of Crime: Moral and Sensual Attractions in Doing Evil.
Basic Books, 1988.

Kem98
Richard A. Kemmerer.
NSTAT: A Model-Based Real-Time Network Intrusion Detection System.
Technical Report TRCS97-18, University of California, Junio 1998.

KI99
Gershon Kedem and Yuriko Ishihara.
Brute force attack on Unix passwords with SIMD computer.
In Proceedings of the 8th USENIX Security Symposium. The USENIX Association, Agosto 1999.

Kir95
Olaf Kirch.
The Linux Network Administrators´ Guide.
O´Reilly & Associates, 1995.

KK92
David Koblas and Michelle Koblas.
Socks.
In Proceedings of the Third Unix Security Symposium, pages 77-83. The USENIX Association, Septiembre 1992.

Kla95
Christopher Klaus.
Stealth Scanning - Bypassing Firewalls and SATAN Detectors, Diciembre 1995.
Internet Security Systems, Inc.

Kle90
Daniel V. Klein.
Foiling the cracker: A survey of, and improvements to, password security.
In Unix Security Workshop, pages 5-14. The USENIX Association, Agosto 1990.

KMM95
R. Kohno, R. Meidan, and L.B. Milstein.
Spread Spectrum Access Methods for Wireless Communications.
IEEE Communications Magazine, 33:58-67, Enero 1995.

Ko96
Calvin Cheuk Wang Ko.
Execution Monitoring of Security-Critical Programs in a Distributed System: A Specification-Based Approach.
PhD thesis, University of California at Davis, 1996.

KP84
Brian W. Kernighan and Rob Pike.
The Unix Programming Environment.
Prentice Hall, 1984.

KS93
Gene H. Kim and Eugene H. Spafford.
The design and implementation of Tripwire: A file system integrity checker.
Technical Report CSD-TR-93-071, Purdue University, Noviembre 1993.

KS94a
Gene H. Kim and Eugene H. Spafford.
Experiences with Tripwire: using integrity checkers for intrusion detection.
In Systems Administration, Networking and Security Conference III. The USENIX Association, Abril 1994.

KS94b
Gene H. Kim and Eugene H. Spafford.
Writing, supporting and evaluating Tripwire: a publically available security tool.
In Proceedings of the USENIX Applications Development Symposium. The USENIX Association, 1994.

KS94c
Sandeep Kumar and Eugene Spafford.
An Application of Pattern Matching in Intrusion Detection.
Technical Report CSD-TR-94-013, Purdue University, Marzo 1994.

KT97
Micki Krause and Harold F. Tipton.
Handbook of Information Security Management.
CRC Press LLC, 1997.

Kum95
Sandeep Kumar.
Classification and Detection of Computer Intrusions.
PhD thesis, Purdue University, Agosto 1995.

L$^+$92
Teresa F. Lunt et al.
A real-time intrusion detection expert system (IDES). final technical report.
Technical report, SRI International, Febrero 1992.

Lam73
B. W. Lampson.
A note on the Confinement Problem.
Communications of the ACM, 16(10):613-615, Octubre 1973.

Lam81
Leslie Lamport.
Password authentication with insecure communication.
Communications of the ACM, 24(11):770-772, Noviembre 1981.

Lap91
J.C. Laprie.
Dependability: Basic concepts and terminology.
Springer-Verlag, 1991.

LBMC94
Carl E. Landwher, Alan R. Bull, John P. McDermott, and William S. Choi.
A taxonomy of computer program security flaws, with examples.
ACM Computing Surveys, 3(26), Septiembre 1994.

Lip75
Steven B. Lipner.
A note on the Confinement Problem.
Operating Systems Review, 9(5):192-196, Noviembre 1975.

Lis95
Justin Jay Lister.
Intrusion Detection Systems: an Introduction to the detection and prevention of computer abuse.
PhD thesis, University of Wollongong, 1995.

LU02
Juan Miguel Velasco López-Urda.
Seguridad bajo control: `outsourcing vs. in house', las claves para evaluar.
Seguridad en Informática y Comunicaciones, (49), Abril 2002.

Lun90
Teresa F. Lunt.
Detecting Intruders in Computer Systems.
In Proceedings of the Sixth Annual Symposium and Technical Displays on Physical and Electronic Security, 1990.

MA94
Roger Merckling and Anne Anderson.
RFC 57.0: Smart Card Introduction, Marzo 1994.

Mai96
Uriel Maimon.
Port Scanning without the SYN flag.
Phrack Magazine, 7(49), 1996.

Man91
Jason Manger.
Unix: The complete book.
Sigma Press, 1991.

Man96
U. Manber.
A simple scheme to make passwords based on One-Way functions much harder to crack.
Computers & Security, 15(2):171-176, 1996.

Mar88a
John Markhoff.
Author of computer `virus' is son of U.S. electronic security expert.
The New York Times, 5 Noviembre 1988.

Mar88b
John Markhoff.
A family´s passion for computers, gone sour.
The New York Times, 11 Noviembre 1988.

McC00
Ron McCarthy.
IP Filter on Solaris.
Sys Admin Magazine, 2000.
Solaris Suplement.

McH95
John McHugh.
Covert channel analysis.
In Handbook for the Computer Security Certification of Trusted Systems. Naval Research Laboratory, Enero 1995.

McI89
M. Douglas McIlroy.
Virology 101.
In USENIX Computing Systems, volume 2, 1989.

McM97
Dave McMordie.
Texture analysis of the human iris for high security authentication.
Technical Report Image Processing 304-529, Department of Electrical Engineering, McGill University, Diciembre 1997.

Mel97
Mark K. Mellis.
Surprises in the DMZ.
;login:, 22(1), Febrero 1997.

Men98
Phunda Menta.
Linux and random source bleaching.
Phrack Magazine, 8(54), 1998.

Mey89
Gordon R. Meyer.
The Social Organization of the Computer Underground.
PhD thesis, Northern Illinois University, 1989.

MF96
Gary McGraw and Edward Felten.
Java Security: Hostile Applets, Holes and Antidotes.
John Wiley and Sons, 1996.

MFS90
Barton P. Miller, Lars Fredriksen, and Bryan So.
An empirical study of the reliability of Unix utilities.
Communications of the ACM, 33(12):32-44, Diciembre 1990.

Mic98
Sun Microsystems.
Solaris 7 System Administration Guide, Volume I, Octubre 1998.
http://docs.sun.com/.

MK94
Ira S. Moskowitz and Myong H. Kang.
Covert Channels - Here to Stay?
In Proceedings of COMPASS´94, pages 235-243. IEEE Press, Junio 1994.

MK99
Andrew D. McDonald and Markus G. Kuhn.
StegFS: A Steganographic File System for Linux.
In Andreas Pfitzmann, editor, Information Hiding, pages 461-475. Springer-Verlag, 1999.

MKL$^+$95
Barton P. Miller, David Koski, Cjin Pheow Lee, Vivekananda Maganty, Ravi Murthy, Ajitkumar Natarajan, and Jeff Steidl.
Fuzz revisited: A re-examination of the reliability of Unix utilities and services.
ftp://grilled.cs.wisc.edu/technical_papers/fuzz-revisited.ps, 1995.

MM00
Jim Mauro and Richard McDougall.
Solaris Internals: Core Kernel Architecture.
Prentice Hall and Sun Microsystems Press, 1st edition, 2000.

MNSS87
S.P. Miller, B.C. Neuman, J.I. Schiller, and J.H. Saltzer.
Kerberos Authentication and Authorization System.
In Project Athena Technical Plan, chapter E.2.1. Massachusetts Institute of Technology, Diciembre 1987.

Mog89
Jeffrey C. Mogul.
Simple and flexible datagram access control for Unix-based gateways.
In Proceedings of the USENIX Summer Conference, pages 203-221. The USENIX Association, 1989.

Mor85
Robert Morris.
A Weakness in the 4.2BSD Unix TCP/IP Software.
Technical Report CSTR-117, AT&T Bell Laboratories, 1985.

Mou00
Gerhard Mourani.
Get acquainted with Linux Security and Optimization System.
Technical report, Open Network Architecture, Enero 2000.

MPS$^+$93
Sead Muftic, Ahmed Patel, Peter Sanders, Rafael Colon, Jan Heijnsdijk, and Unto Pulkkinen.
Security in Open Systems.
John Wiley and Sons, 1993.

MS98
Nimisha V. Mehta and Karen R. Sollins.
Expanding and extending the security features of Java.
In Proceedings of the 7th USENIX Security Symposium. The USENIX Association, Enero 1998.

MT79
Robert Morris and Ken Thompson.
Password security: A case history.
Communications of the ACM, 22(11), Noviembre 1979.

MTHZ92
Refik Molva, Gene Tsudik, Els Van Herrenweghen, and Stefano Zatti.
KryptoKnight Authentication and Key Distribution Service.
In Proceedings of ESORICS 92, Octubre 1992.

MvOV96
Alfred J. Menezes, Paul C. van Oorschot, and Scott A. Vanstone.
Handbook of Applied Cryptography.
CRC Press, Octubre 1996.

NB01a
Alex Noordergraaf and Glenn Brunette.
The Solaris Security Toolkit - Installation, Configuration and Usage Guide.
Sun Microsystems, Junio 2001.
Sun BluePrints OnLine.

NB01b
Alex Noordergraaf and Glenn Brunette.
The Solaris Security Toolkit - Internals.
Sun Microsystems, Junio 2001.
Sun BluePrints OnLine.

NB01c
Alex Noordergraaf and Glenn Brunette.
The Solaris Security Toolkit - Quick Start.
Sun Microsystems, Junio 2001.
Sun BluePrints OnLine.

NB01d
Alex Noordergraaf and Glenn Brunette.
The Solaris Security Toolkit - Release Notes.
Sun Microsystems, Junio 2001.
Sun BluePrints OnLine.

Noo01
Alex Noordergraaf.
Building a JumpStart Infrastructure.
Sun Microsystems, Abril 2001.
Sun BluePrints OnLine.

Nor99
Stephen Northcutt.
Network Intrusion Detection: An Analyst´s Handbook.
New Riders, 1999.

NS78
R.M. Needham and M.D. Schroeder.
Using encryption for authentication in large networks of computers.
Communications of the ACM, 21(12):993-999, Diciembre 1978.

NSS89
Evi Nemeth, Garth Snyder, and Scott Seebass.
Unix System Administration Handbook.
Prentice Hall, 1989.

NW99
Alex Noordergraaf and Keith Watson.
Solaris Operating Environment Network Settings for Security.
Sun Microsystems, Diciembre 1999.
Sun BluePrints OnLine.

Olo92
Tomas Olovsson.
A structured approach to computer security.
Technical Report 122, Chalmers University of Technology, 1992.

One96
Aleph One.
Smashing the stack for fun and profit.
Phrack Magazine, 7(49), Noviembre 1996.

Org88
International Standards Organization.
Information Processing Systems - OSI RM.
Technical Report 97 7498-2, ISO/TC, 1988.
Part 2: Security Architecture.

oS80
National Bureau of Standars.
DES Modes of Operation.
Technical Report NBS FIPS PUB 81, U.S. Department of Commerce, Dicembre 1980.

oST84
National Institute of Standards and Technology.
Digital Signature Standard.
Technical Report NIST FIPS PUB 185, U.S. Department of Commerce, Mayo 1984.

OT88
Tim O´Reilly and Grace Todino.
Managing UUCP and UseNet.
O'Reilly & Associates, Marzo 1988.

otUAH90
Department of the US Army Headquarters.
Basic cryptanalysis.
Technical Report FM-34-40-2, United States Army, Septiembre 1990.

P$^+$94
Susan Peppard et al.
Unix Unleashed.
Sams Publishing, 1st edition, 1994.

Par81
Donn B. Parker.
Computer Security Management.
Prentice Hall, 1981.

Par94
Donn B. Parker.
Demonstrating the elements of information security with threats.
In Proceedings of the 17th National Computer Security Conference, pages 421-430, 1994.

Par98
William Parkhurst.
Cisco Router OSPF Design and Implementation Guide.
McGrawHill, 1998.

PB93
W. Timothy Polk and Lawrence E. Bassham.
Security issues in the Database Language SQL, Julio 1993.

Pfl97
Charles P. Pfleeger.
Security in computing.
Prentice Hall, 1997.

Phi97
Ken Phillips.
Biometric identification comparison chart.
PC Week, Marzo 1997.

Pit00
Jesús Pita.
La tarjeta inteligente como medio de identificación electrónica y acceso a servicios de seguridad: la experiencia de la FNMT-RCM.
Seguridad en Informática y Comunicaciones, (39), Abril 2000.

PK91
P.A. Porras and R.A. Kemmerer.
Analyzing covert storage channels.
In Proceedings of the 1991 Symposium on Research in Security and Privacy, pages 36-51. IEEE Computer Society, Mayo 1991.

PK92
P.A. Porras and R.A. Kemmerer.
Penetration state transition analysis: a rule-based intrusion detection approach.
In Proceedings of the 8th Computer Security Application Conference, pages 220-229, Noviembre 1992.

Pla83
José Plans.
La pratique de l´audit informatique.
Eyrolles, 1983.

PN92
Norman E. Proctor and Peter G. Neumann.
Architectural implications of Covert Channels.
In Proceedings of the 15th National Computer Security Conference, pages 28-43, Octubre 1992.

Por92
Phillip A. Porras.
STAT: A State Transition Analysis Tool for Intrusion Detection.
PhD thesis, University of California, Junio 1992.

PP01
Marty Poniatowski and Martin Poniatowski.
HP-UX 11i System Administration Handbook and Toolkit.
Prentice Hall, Abril 2001.

PPK93
Pinkas, Parker, and Kaijser.
SESAME: An Introduction, 1993.

RA94
Marcus J. Ranum and Frederick M. Avolio.
A toolkit and methods for internet firewalls.
In Proceedings of the Technical Summer Conference, pages 37-44. The USENIX Association, Junio 1994.

Rad92
Peter V. Radatti.
Computer virus awareness for UNIX.
NCSA News, 3:8, Mayo 1992.

Rad93
Peter V. Radatti.
The plausibility of UNIX virus attacks.
Technical report, Cybersoft, Inc., 1993.

Rad95
Peter V. Radatti.
Computer viruses in Unix networks.
Technical report, Cybersoft, Inc., 1995.

Rad97
Peter V. Radatti.
MrMean the hacker.
;login:, Octubre 1997.

Ran93
Marcus J. Ranum.
Thinking about Firewalls.
In Proceedings of the Second SANS Conference, Abril 1993.

Ran95
Marcus J. Ranum.
Firewalls Frequently Asked Questions, 1995.

Ran98
Marcus J. Ranum.
Intrusion Detection: Challenges and Myths.
Technical report, Network Flight Recorder, Inc., 1998.

Ran00
Marcus J. Ranum.
The network police blotter.
;login:, 25(5), Agosto 2000.

RCG96
A. Ribagorda, A. Calvo, and M.A. Gallardo.
Seguridad en Unix: Sistemas Abiertos e Internet.
Paraninfo, 1996.

Reh00
Rafeeg Rehman.
HP Certified: HP-UX System Administration.
Prentice Hall, Mayo 2000.

Rei89
N. Reichman.
Breaking confidences: Organizational influences on insider trading.
The Sociological Quarterly, 30:185-204, 1989.

Ris01
Neil B. Riser.
An overview of some the current spoofing threats, Julio 2001.
The SANS Institute.

Rit86
Dennis M. Ritchie.
On the security of UNIX.
In UNIX System Manager's Manual, 4.3 BSD, Virtual VAX-11 Version, pages 17:1-3. University of California, Berkeley, CA, Abril 1986.

Riv90
Ron Rivest.
The MD4 message digest algorithm.
In Crypto´90 Abstracts, pages 281-291, Agosto 1990.

Riv92
Ron Rivest.
The MD5 message digest algorithm, Abril 1992.
Internet Request for Comments 1321.

Rob94
Andrew T. Robinson.
Internet Firewalls: An Introduction.
Technical report, NetMAINE, P.O. BOX 8258, Portland, ME 04104-8258, USA, 1994.

Roe99
Martin Roesch.
Snort - Lightweight Intrusion Detection for Networks.
In Proceedings of the 13th Systems Administration Conference - LISA´99. The USENIX Association, Noviembre 1999.

Rou96
Route.
Project Loki: ICMP Tunnelling.
Phrack Magazine, 7(49), Noviembre 1996.

Row96
Craig H. Rowland.
Covert Channels in the TCP/IP Protocol Suite, 1996.

Roy88
Mike Royko.
Here´s how to stop computer vandals.
The Chicago Tribune, 7 Noviembre 1988.

Rus00
Rusty Russell.
Linux ipchains HOWTO, v. 1.0.8.
http://www.linuxdoc.org/HOWTO/IPCHAINS-HOWTO.html, Julio 2000.

Rus02
Rusty Russell.
Linux 2.4 Packet Filtering HOWTO v. 1.2.
http://netfilter.samba.org/documentation/HOWTO/packet-filtering-HOWTO.txt, 2002.

RW84
James A. Reeds and Peter J. Weinberger.
File security and the UNIX system crypt command.
AT&T Bell Labs Technical Journal, 63(8):1673-1683, Octubre 1984.

Sal90
A. Salomaa.
Public Key Cryptography.
Springer-Verlag, 1990.

SBL90
Corey Sandler, Tom Badgett, and Larry Lefkowitz.
VAX Security: Protecting the System and the Data.
John Wiley and Sons, 1990.

Sch94
Bruce Schneier.
Applied Cryptography: Protocols, Algorithms and Source Code in C.
John Wiley & Sons, 1994.

Sch97
John Schimmel.
A historical look at firewall technologies.
;login:, 22(1), Febrero 1997.

See89
Donn Seeley.
A tour of the Worm.
In Proceedings of 1989 Winter USENIX Conference. The USENIX Association, Febrero 1989.

Sei99
Kurt Seifried.
Linux Administrator´s Security Guide.
http://www.securityportal.com/lasg/, 1999.

Sem96
Chuck Semeria.
Internet Firewalls and Security.
Technical report, 3Com, 1996.

Ser91
Omri Serlin.
SVR4 may become the first truly secure Unix.
UNIXWORLD, VIII(11):39-40, Noviembre 1991.

SG91
Shiuhpyng Winston Shieh and Virgil D. Gligor.
A pattern-oriented intrusion model and its applications.
In Proceedings of the 1991 IEEE Computer Society Symposium on Research in Security and Privacy, pages 327-342. IEEE Computer Society, Mayo 1991.

SH82
John F. Shoch and Jon A. Hupp.
The worm programs - early experience with a distributed computation.
Communications of the ACM, 25(3):172-180, Marzo 1982.

SH95
Karanjit Siyan and Chris Hare.
Internet y seguridad en redes.
Prentice Hall, 1995.

Sha49
C. E. Shannon.
Communication theory of secrecy systems.
Bell Systems Technology Journal, 28:657-715, 1949.

Sho00
Adam Shostack.
Security code review guidelines, 2000.

Sim90
Steve Simmons.
Life without root.
In Proceedings of the 4th Systems Administration Conference - LISA´90. The USENIX Association, Octubre 1990.

SK98
Bruce Schneier and John Kelsey.
Cryptographic support for secure logs on untrusted machines.
In Proceedings of the 7th USENIX Security Symposium. The USENIX Association, Enero 1998.

Skl01
Sandor W. Sklar.
The AIX Error Logging Facility.
Sys Admin, 10(6), Junio 2001.
AIX Administration Supplement.

SM70
Gresham Sykes and David Matza.
Techniques of Neutralization: A Theory of Delinquency.
In Marvin E. Wolfgang et al., editors, The Sociology of Crime and Delinquency, pages 292-299. John Wiley and Sons, 2nd edition, 1970.

Smi92
Martin Smith.
Personnel Security.
In Keith M. Jackson and Jan Hruska, editors, Computer Security Reference Book, chapter 33, pages 417-436. Butterworth-Heinemann, 1992.

Smi97
Nathan P. Smith.
Stack Smashing Vulnerabilities in the Unix Operating System, 1997.
http://millcomm.com/~nate/machines/security/stack-smashing/.

Smu90
Peter Smulders.
The Threat of Information Theft by Reception of Electromagnetic Radiation from RS-232 Cables.
Computers and Security, 9(1), 1990.

Spa88
Eugene H. Spafford.
The Internet Worm program: An analysis.
Technical Report CSD-TR-823, Purdue University Department of Computer Science, 1988.

Spa89
Eugene H. Spafford.
The Internet Worm: Crisis and aftermath.
Communications of the ACM, 32(6):678-687, 1989.

Spa90
Eugene H. Spafford.
Are computer hacker break-ins ethical?
Technical Report CSD-TR-994, Purdue University, Julio 1990.

Spa91a
Eugene H. Spafford.
The Internet Worm incident.
Technical Report CSD-TR-933, Purdue University Department of Computer Science, 1991.

Spa91b
Eugene H. Spafford.
OPUS: Preventing weak password choices.
In Proceedings of the 14th National Computer Security Conference, pages 446-455, Octubre 1991.

Spi01a
Lance Spitzner.
Intrusion Detection for Check Point FireWall-1.
http://www.enteract.com/~lspitz/intrusion.html, Diciembre 2001.

Spi01b
Lance Spitzner.
Know your enemy: Honeynets.
http://project.honeynet.org/papers/honeynet/, 2001.

Spr01
Ian P. Springer.
HP-UX FAQ, Noviembre 2001.
http://www.faqs.org/faqs/hp/hpux-faq/.

Sta00
British Standard.
Information technology - Code of practice for information security management.
Technical Report BS ISO/IEC 17799:2000, British Standard Publishing Limited, Diciembre 2000.

Ste90
W. Richard Stevens.
Unix Network Programming.
Prentice Hall, 1990.

Ste94
W. Richard Stevens.
TCP/IP Illustrated Volume I: The Protocols.
Addison Wesley, 1994.

Ste98a
Ingo Stengel.
Security architectures based on active firewall components, 1998.
FH-Darmstadt.

Ste98b
Kevin Steves.
Building a bastion host using HP-UX 10.
http://people.hp.se/stevesk/bastion10.html, 1998.

Ste00
Kevin Steves.
Building a bastion host using HP-UX 11.
http://people.hp.se/stevesk/bastion11.html, 2000.

Sto88
Cliff Stoll.
Stalking the wily hacker.
Communications of the ACM, 31(5):484-497, Mayo 1988.

Sto89
Cliff Stoll.
The Cuckoo's Egg.
Doubleday, 1989.

Sun96
Aurobindo Sundaram.
An introduction to Intrusion Detection.
Crossroads: The ACM Student Magazine, 2(4), Abril 1996.

Swi92
Peter Swinbank.
Electromagnetic Radiation.
In Keith M. Jackson and Jan Hruska, editors, Computer Security Reference Book, chapter 11, pages 75-90. Butterworth-Heinemann, 1992.

Tan91
Andrew Tanenbaum.
Operating Systems: Design and Implementation.
Prentice Hall, 1991.

Tan95
Andrew Tanenbaum.
Distributed Operating Systems.
Prentice Hall, 1995.

Tan96
Andrew Tanenbaum.
Computer Networks.
Prentice Hall, 1996.

Tho84
Ken Thompson.
Refections on trusting trust.
Communications of the ACM, 27(8), Agosto 1984.

Thu00
Thuull.
Anomaly Detection Systems.
2600: The Hacker Quartely, 17(3), Primavera 2000.

Tom75
Raymond S. Tomlinson.
Selecting Sequence Numbers.
In Proceedings of SIGCOMM/SIGOPS Interprocess Communication Workshop, pages 11-23. ACM, 1975.

Tom94
Chris Tomlinson.
A Practical Guide to Solaris Security.
Technical report, Sun Microsystems (UK), Marzo 1994.

Tox00
Bob Toxen.
Real World Linux Security: Intrusion Prevention, Detection and Recovery.
Prentice Hall, 1st edition, 2000.

TW93
G. Winfield Treese and Alec Wolman.
X through the firewall, and other applications relays.
In Proceedings of the USENIX Summer Conference. The USENIX Association, Junio 1993.

TY82
Rebecca Thomas and Jean Yates.
A User Guide to the Unix System.
McGrawHill, 1982.

V$^+$00
Scott Vetter et al.
IBM Certification Study Guide. AIX v4.3 System Administration.
IBM, 2000.
IBM RedBook SG24-5129-00.

vE85
Wim van Eck.
Electromagnetic Radiation from Video Display Units: An Eavesdropping Risk?
Computers and Security, 4(4), 1985.

Ven92
Wietse Venema.
TCP Wrapper: Network monitoring, access control and booby traps.
In Proceedings of the 3rd USENIX Unix Security Symposium, pages 85-92. The USENIX Association, Septiembre 1992.

Vic94
Bob Vickers.
Guide to safe X, Febrero 1994.

vKPG97
Robert van Kralingen, Corien Prins, and Jan Grijpink.
Using your body as a key: legal aspects of biometrics, 1997.

Vol97
Yuri Volobuev.
Playing redir games with ARP and ICMP, Septiembre 1997.

vSS98
Carl van Schaik and Paul Smeddle.
A Steganographic File System Implementation for Linux.
Technical report, University of Cape Town (South Africa), Octubre 1998.

vSTO94
R. G. van Schyndel, A. Z. Tirkel, and C. F. Osborne.
A digital watermark.
In International Conference on Image Processing, volume 2, pages 86-90. IEEE, 1994.

WA02
Dameon D. Welch-Abernathy.
Essential Checkpoint Firewall-1: An Installation, Configuration, and Troubleshooting Guide.
Addison Wesley, 2002.

WC94
John P. Wack and Lisa J. Carnahan.
Keeping your site comfortably secure: an introduction to Internet Firewalls.
Technical report, National Institute of Standards and Technology (NIST), Diciembre 1994.
Special Publication 800-10.

WD95
Ira S. Winkler and Brian Dealy.
Information security technology?...Don´t rely on it. A case study in social engineering.
In Proceedings of the 5th USENIX Unix Security Symposium. The USENIX Association, Junio 1995.

Wil74
M. J. Williamson.
Non-Secret encryption using a finite field.
Technical report, CESG, Enero 1974.

Wil76
M. J. Williamson.
Thoughts on cheaper Non-Secret encryption.
Technical report, CESG, Agosto 1976.

Won01
Chris Wong.
HP-UX 11i Security.
Prentice Hall, Septiembre 2001.

Wra91a
J.C. Wray.
An analysis of covert timing channels.
In Proceedings of the 1991 Symposium on Research in Security and Privacy, pages 2-7. IEEE Computer Society, Mayo 1991.

Wra91b
J.W. Wray.
Toward a mathematical foundation for information flow security.
In Proceedings of the 1991 Symposium on Research in Security and Privacy, pages 21-34. IEEE Computer Society, Mayo 1991.

Wre98
Dave Wreski.
Linux Security Administrator´s Guide.
http://nic.com/~dave/Security/, 1998.

Ylo96
Tatu Ylonen.
SSH - Secure login connetions over the Internet.
In Proceedings of the 6th USENIX Security Symposium, pages 37-42. The USENIX Association, Julio 1996.

Zie01
Robert L. Ziegler.
Linux Firewalls.
New Riders, 2nd edition, 2001.

Zim95a
Phil Zimmermann.
The Official PGP User´s Guide.
M.I.T. Press, 1995.

Zim95b
Phil Zimmermann.
PGP: Source Code and Internals.
M.I.T. Press, 1995.



Subsecciones

2002-07-15