 
 
 
 
 
 
 
  
 Siguiente: GNU Free Documentation License
 Subir: SEGURIDAD EN UNIX Y
 Anterior: Conclusiones
     Índice General 
- Age85
- 
National Security Agency.
 Magnetic Tape Degausser.
 Technical Report L14-4-A, National Security Agency/Central Security
  Service, Octubre 1985.
- AK96
- 
Ross J. Anderson and Markus Kuhn.
 Tamper resistance - a cautionary note.
 In Proceedings of the 2nd USENIX Workshop on Electronic
  Commerce, pages 1-11. The USENIX Association, Noviembre 1996.
- AKS96
- 
Taimur Aslam, Ivan Krsul, and Eugene H. Spafford.
 Use of a taxonomy of security faults.
 Technical Report TR-96-051, Purdue University Department of Computer
  Science, 1996.
- ALGJ98
- 
Stefan Axelsson, Ulf Lindqvist, Ulf Gustafson, and Erland Jonsson.
 An approach to Unix Security Logging.
 In Proceedings of the 21st National Information Systems Security
  Conference, pages 62-75. National Institute of Standards and
  Technology/National Computer Security Center, Octubre 1998.
- And80
- 
James P. Anderson.
 Computer security threat monitoring and surveillance.
 Technical report, James P. Anderson Co., Abril 1980.
- And94
- 
Ross J. Anderson.
 Why Cryptosystems Fail.
 Communications of the ACM, 37:32-40, Noviembre 1994.
- And97
- 
Ross J. Anderson.
 Tamperproofing of Chip Cards.
 Enviado a la lista cypherpunks@cyberpass.net por William H.
  Geiger III en septiembre, 1997.
- Ano97
- 
Anonymous.
 Maximum Security: a hacker´s guide to protecting your
  Internet site and network.
 McMillan Computer Publishing, 1997.
- Ano01
- 
Anonymous.
 Maximum Linux Security: a hacker´s guide to protecting
  your Linux Server and Workstation.
 Sams Publishing, 2001.
- ANS98
- 
R. J. Anderson, R. M. Needham, and A. Shamir.
 The Steganographic File System.
 Lecture Notes in Computer Science, 1525:73-82, 1998.
- Ark99
- 
Ofir Arkin.
 Network Scanning Techniques, Noviembre 1999.
 PubliCom Communications Solutions.
- Atk93
- 
Derek A. Atkins.
 Charon: Kerberos Extensions for Authentication over Secondary
  Networks.
 PhD thesis, Department of Electrical Engineering and Computer
  Science, Massachusetts Institute of Technology, 1993.
- Axe98
- 
Stefan Axelsson.
 Research in intrusion-detection systems: A survey.
 Technical Report 98-17, Chalmers University of Technology, Diciembre
  1998.
- B+85
- 
Sheila L. Brand et al.
 Department of Defense Trusted Computer System Evaluation
  Criteria.
 Technical Report DOD 5200.28-STD, Department of Defense, Diciembre
  1985.
- B+88
- 
Sue Berg et al.
 Glossary of Computer Security Terms.
 Technical Report NCSC-TG-004, National Computer Security Center,
  Octubre 1988.
- Bac86
- 
Maurice J. Bach.
 The Design of the Unix Operating System.
 Prentice Hall, 1986.
- Bai97
- 
Edward C. Bailey.
 Maximum RPM: Taking the Red Hat Package Manager
  to the limit.
 Red Hat Software, Inc., 1997.
- BAW96
- 
F. Bouchier, J.S. Ahrens, and G. Wells.
 Laboratory evaluation of the IriScan prototype biometric
  identifier.
 Technical Report SAND96-1033, Sandia National Laboratories, Abril
  1996.
- BB99
- 
Roland Büschkes and Mark Borning.
 Transaction-based Anomaly Detection.
 In Proceedings of Workshop on Intrusion Detection and Network
  Monitoring. The USENIX Association, Abril 1999.
- BBD+96
- 
Michael Beck, Harold Bohme, Mirko Dzladzka, Ulrich Kunitz, Robert Magnus, and
  Dirk Verworner.
 Linux Kernel Internals.
 Addison-Wesley, 1996.
- BCOW94
- 
John Barkley, Lisa Carnahan, Karen Olsen, and John Wack.
 Improving security in a network environment.
 In John Barkley, editor, Security in Open Systems,
  chapter 10. National Institute of Standards and Technology (NIST),
  Julio 1994.
 Special Publication 800-7.
- BD96
- 
Matt Bishop and Michael Dilger.
 Checking for race conditions in file accesses.
 Computing System, 9(2):131-152, Primavera 1996.
- Bel89
- 
Steven M. Bellovin.
 Security problems in the TCP/IP Protocol Suite.
 Computer Communications Review, 19(2):32-48, Abril 1989.
- Bel92
- 
Steven M. Bellovin.
 There be dragons.
 In Proceedings of the Third USENIX Security Symposium,
  pages 1-16. The USENIX Association, Septiembre 1992.
- Bel93a
- 
Walter Belgers.
 Unix password security, 1993.
- Bel93b
- 
Steven M. Bellovin.
 Packets found on an internet.
 Computer Communications Review, 23(3):26-31, Julio 1993.
- Bel96
- 
Steven M. Bellovin.
 RFC1498: Defending against sequence number attacks, Mayo 1996.
- BF99
- 
Dirk Balfanz and Edward W. Felten.
 Hand-held computers can be better smart cards.
 In Proceedings of the 8th USENIX Security Symposium. The
  USENIX Association, Agosto 1999.
- BGML96
- 
W. Bender, D. Gruhl, N. Morimoto, and A. Lu.
 Techniques for data hiding.
 IBM Systems Journal, 35(3,4), 1996.
- Bha01
- 
Nishchal Bhalla.
 AIX 4.3 bastion host guidelines, Junio 2001.
 The SANS Institute.
- Bis86
- 
Matt Bishop.
 How to write a setuid program.
 ;login:, 12(1), Enero 1986.
- Bis90
- 
Matt Bishop.
 A Security Analysis of the NTP Protocol, 1990.
- Bis91
- 
Matt Bishop.
 A proactive password checker.
 In D.T. Lindsay and W.L. Price, editors, Proceedings of the 7th
  International Conference on Information Security, pages 150-158, Mayo 1991.
- Bis92
- 
Matt Bishop.
 Anatomy of a proactive password changer.
 In Proceedings of USENIX Unix Security III. The USENIX Association, 1992.
- Bis95
- 
Matt Bishop.
 Race conditions, files and security flaws; or the tortoise and the
  hare redux.
 Technical Report CSE-95-8, University of California at Davis, 1995.
- BK95
- 
Matt Bishop and Daniel V. Klein.
 Improving system security via proactive password checking.
 Computers & Security, 14(3):233-249, 1995.
- Bla93
- 
Matt Blaze.
 A Cryptographic File System for Unix.
 In Proceedings of the 1st ACM Conference on Computer and
  Communications Security, pages 9-16. ACM, Noviembre 1993.
- BM91
- 
Steven M. Bellovin and Michael Merritt.
 Limitations of the Kerberos Authentication System.
 In Proceedings of the Winter 1991 USENIX Conference,
  pages 253-267. The USENIX Association, Enero 1991.
- BPB00
- 
Bill Ball, David Pitts, and William Ball.
 Red Hat Linux 7 Unleashed.
 Sams Publishing, 2000.
- C+91
- 
Dave Curry et al.
 RFC1244: Site Security Handbook.
 Internet Activities Board, Julio 1991.
- C+98
- 
Crispin Cowan et al.
 StackGuard: automatic adaptative detection and prevention of
  buffer-overflow attacks.
 In Proceedings of the 7th USENIX Security Symposium. The
  USENIX Association, Enero 1998.
- CA97a
- 
Bryan Costales and Eric Allman.
 Sendmail.
 O´Reilly & Associates, 2nd edition, Enero 1997.
- CA97b
- 
Bryan Costales and Eric Allman.
 Sendmail Desktop Reference.
 O´Reilly & Associates, Marzo 1997.
- Cab96
- 
Pino Caballero.
 Introducción a la Criptografía.
 Ra-Ma, 1996.
- Caj82
- 
Valentin Sanz Caja.
 Vulnerabilidad y seguridad de los sistemas informáticos.
 Fundación Citema, 1982.
- CB94
- 
William R. Cheswick and Steven M. Bellovin.
 Firewalls and Internet Security: Repelling the wily hacker.
 Addison Wesley, 1994.
- CC86
- 
D.B. Cornish and R. V. Clarke.
 The Reasoning Criminal: Rational Choice Perspectives on
  Offending.
 Springer-Verlag, 1986.
- CDK94
- 
G.F. Couloris, J. Dollimore, and T. Kindberg.
 Distributed Systems. Concepts and design.
 Addison Wesley, 2nd edition, 1994.
- CDM97
- 
Rémy Card, Eric Dumas, and Frack Mével.
 Programación Linux 2.0: API de sistema y funcionamiento del
  núcleo.
 Eyrolles, 1997.
- Cen91
- 
National Computer Security Center.
 Data Remanence in Automated Information Systems.
 Technical Report NCSC-TG-025, National Computer Security Center,
  Septiembre 1991.
- CER99
- 
CERT.
 CERT Advisory CA-99-02. Trojan Horses.
 Technical report, Computer Emergency Response Team, Marzo 1999.
- CES91
- 
CESID.
 Glosario de términos de Criptología.
 Centro Superior de Información de la Defensa, 1991.
- CH99
- 
Stephen Ciullo and Daniel Hinojosa.
 HP-UX kernel tuning and performance guide.
 http://www.hp.com/techpartners/tuning.html, 1999.
- Cha92
- 
D. Brent Chapman.
 Network (In)Security through IP packet filtering.
 In Proceedings of the third USENIX Security Symposium,
  pages 63-76. The USENIX Association, Septiembre 1992.
- Che92
- 
William R. Cheswick.
 An evening with Berferd, in which a cracker is lured, endured, and
  studied.
 In Proceedings of the Winter USENIX Conference. The USENIX Association, Enero 1992.
- CHN+92
- 
Andrew Cherry, Mark W. Henderson, William K. Nickless, Robert Olson, and Gene
  Rackow.
 Pass or fail: A new test for password legitimacy, 1992.
- CHS91
- 
Bruce Corbridge, Robert Henig, and Charles Slater.
 Packet filtering in an IP router.
 In Proceedings of the Fifth LISA Conference, pages 227-232.
  The USENIX Association, Octubre 1991.
- CKL97
- 
M. Ruschitzka C. Ko and K. Levitt.
 Execution monitoring of security-critical programs in distributed
  systems: A specification-based approach.
 In Proceedings of the 1997 IEEE Symposium on Security and
  Privacy, pages 175-187. IEEE Computer Society, Mayo 1997.
- Coc73
- 
C.C. Cocks.
 A note on non-secret encryption.
 Technical report, CESG, Noviembre 1973.
- Coh84
- 
Fred Cohen.
 Computer viruses: theory and experiments.
 In 7th DoD/NBS Computer Security Conference Proceedings,
  pages 240-263, Septiembre 1984.
- Coh99
- 
Fred Cohen.
 Simulating Cyber Attacks, Defenses and Consequences.
 http://all.net/journal/ntb/simulate/simulate.html, Mayo 1999.
- CoIST99
- 
National Research Council Committee on Information Systems Trustworthiness.
 Trust in Cyberspace.
 National Academy Press, 1999.
- Com88
- 
Apollo Computer.
 Managing SysV System Software.
 Technical Report 010851-A00, Apollo Computer, Inc. (Hewlett Packard),
  Junio 1988.
- Com95
- 
Douglas E. Comer.
 Internetworking with TCP/IP. Volume 1: Principles,
  Protocols & Architecture.
 Prentice Hall, 3rd edition, 1995.
- Con99
- 
Intrusion Detection System Consortium.
 Intrusion Detection Systems buyer´s guide.
 Technical report, ICSA.NET, 1999.
- Cow92
- 
Randle Cowcher.
 Physical Security.
 In Keith M. Jackson and Jan Hruska, editors, Computer Security
  Reference Book, chapter 24, pages 311-332. Butterworth-Heinemann, 1992.
- CR94
- 
Kaare Christian and Susan Richter.
 The Unix Operating System.
 John Wiley & Sons, 1994.
- Cru00
- 
Jeff Crume.
 Inside Internet Security: What hackers don´t want you to
  know.
 Addison Wesley, 2000.
- CWP+00
- 
Crispin Cowan, Perry Wagle, Calton Pu, Steve Beattie, and Jonathan Walpole.
 Buffer Overflows: Attacks and Defenses for the Vulnerability
  of the Decade.
 In Proceedings of the SANS 2000 Conference. The SANS Institute, 2000.
- CZ95
- 
D. Brent Chapman and Elizabeth D. Zwicky.
 Building Internet Firewalls.
 O´Reilly & Associates, 1st edition, Noviembre 1995.
- dA88
- 
Ana Maria de Alvaré.
 How crackers crack passwords, or what passwords to avoid.
 Technical Report UCID-21515, Lawrence Livermore National Laboratory,
  Septiembre 1988.
- Dae96
- 
Daemon9.
 IP-Spoofing demystified.
 Phrack Magazine, 7(48), Junio 1996.
- Dau97
- 
John Daugman.
 Iris recognition for personal identification, 1997.
- Dau98
- 
John Daugman.
 Recognizing persons by their iris patterns.
 In Biometrics: Personal Identification in Networked
  Society, pages 103-121. Kluwer, 1998.
- Den83
- 
Dorothy Denning.
 Cryptography and Data Security.
 Addison-Wesley, 1983.
- Den90
- 
P. Denning.
 Computers under attack.
 ACM Press, 1990.
- Det01
- 
Dethy.
 Examining portscan methods - Analysing Audible Techniques,
  January 2001.
 http://www.synnergy.net/downloads/papers/portscan.txt.
- DFW96
- 
Drew Dean, Edward W. Felten, and Dan S. Wallach.
 Java Security: from HotJava to Netscape and beyond.
 In Proceedings of the IEEE Symposium on Security and
  Privacy, 1996.
- DH76
- 
W. Diffie and M. E. Hellman.
 New directions in cryptography.
 IEEE Transactions on Information Theory, IT-22:644-654,
  Noviembre 1976.
- DH77
- 
W. Diffie and M.E. Hellman.
 Exhaustive cryptanalysis of the NBS data encryption standad.
 Computer, 10(6):74-84, Junio 1977.
- Dik99
- 
Casper Dik.
 Solaris 2 FAQ, Octubre 1999.
 ftp://ftp.wins.uva.nl/pub/solaris/.
- DNO01
- 
Vasanthan Dasan, Alex Noordergraaf, and Lou Ordorica.
 The Solaris Fingerprint Database - A Security Tool
  for Solaris Operating Environment Files.
 Sun Microsystems, Mayo 2001.
 Sun BluePrints OnLine.
- DP84
- 
D. W. Davies and W. L. Price.
 Security for Computer Networks: An Introduction to Data Security
  in Teleprocessing and Electronic Funds Transfer.
 John Wiley and Sons, New York, 1984.
- Duf89
- 
Tom Duff.
 Experience with viruses on UNIX systems.
 In USENIX Computing Systems, volume 2, 1989.
- Ell70
- 
J. H. Ellis.
 The possibility of Non-Secret digital encryption.
 Technical report, CESG, Enero 1970.
- ER89
- 
M.W. Eichin and J.A. Rochlis.
 With microscope and tweezers: An analysis of the Internet Virus
  of November 1988.
 In IEEE Security and Privacy, pages 326-343, 1989.
- Esc98
- 
Terry Escamilla.
 Intrusion Detection: Network Security beyond the
  Firewall.
 John Wiley and Sons, 1998.
- Eve92
- 
David Everett.
 Identity verification and biometrics.
 In Keith M. Jackson and Jan Hruska, editors, Computer Security
  Reference Book, chapter 10, pages 37-73. Butterworth-Heinemann, 1992.
- FBDW96
- 
Edward W. Felten, Dirk Balfanz, Drew Dean, and Dan S. Wallach.
 Web Spoofing: an Internet Con Game.
 Technical Report 540-96, Princeton University Department of Computer
  Science, 1996.
 Revisado en febrero de 1997.
- Fen99
- 
Carole Fennelly.
 The human side of computer security.
 SunWorld, Julio 1999.
- Fis95
- 
John Fisher.
 Securing X Windows.
 Technical Report CIAC-2316 R.0, Department of Energy Computer
  Incident Advisory Capability - CIAC, Agosto 1995.
- FK90
- 
David C. Feldmeirer and Philip R. Karn.
 UNIX password security - ten years later.
 In G. Brassard, editor, CRYPTO89, pages 44-63.
  Springer-Verlag, 1990.
 Lecture Notes in Computer Science No. 435.
- Fly00a
- 
Hal Flynn.
 Back to the Basics: Solaris and inetd.conf, Marzo 2000.
 http://www.securityfocus.com/focus/sun/articles/inetd[1,2].html.
- Fly00b
- 
Hal Flynn.
 Back to the Basics: Solaris default processes and init.d, part
  III, Junio 2000.
 http://www.securityfocus.com/focus/sun/articles/b5.html.
- FPA98
- 
Dan Farmer, Brad Powell, and Matthew Archibald.
 Titan.
 In Proceedings of the 12th Systems Administration Conference -
  LISA´98. The USENIX Association, Diciembre 1998.
- Fre98
- 
Martin Freiss.
 Protecting networks with SATAN.
 O'Reilly & Associates, 1st edition, Mayo 1998.
- Fri95
- 
Æleen Frisch.
 Essential System Administration.
 O´Reilly & Associates, 1995.
- Fyo98
- 
Fyodor.
 Remote OS detection via TCP/IP Stack Fingerprinting,
  Octubre 1998.
 http://www.insecure.org/nmap/nmap-fingerprinting-article.html.
- G+93
- 
Virgil D. Gligor et al.
 A Guide to understanding Covert Channel Analysis of Trusted
  Systems.
 Technical Report NCSC-TG-030, National Computer Security Center,
  Noviembre 1993.
- Gal96a
- 
Miguel Ángel Gallardo.
 Informatoscopia y tecnología forense.
 In Ámbito Jurídico de las Tecnologías de la
  Información. Consejo General del Poder Judicial, 1996.
- Gal96b
- 
Miguel Ángel Gallardo.
 Seguridad (e inseguridad) en Java.
 Seguridad en Informática y Comunicaciones, (20), Junio 1996.
- Gal96c
- 
Peter Galvin.
 Controlling ACLs.
 SunWorld, Agosto 1996.
- Gar95
- 
Simson Garfinkel.
 PGP: Pretty Good Privacy.
 O'Reilly & Associates, Enero 1995.
- GB97
- 
Barbara Guttman and Robert Bagwill.
 Internet Security Policy: A Technical Guide.
 Technical report, National Institute of Standards and Technology,
  Julio 1997.
- GB99
- 
Marcus Goncalves and Steven Brown.
 Check Point Firewall-1 Administration Guide.
 McGrawHill, 1999.
- GC94
- 
Berny Goodheart and James Cox.
 The Magic Garden Explained: The Internals of Unix System V
  Release 4, an Open Systems Design.
 Prentice Hall, 1994.
- GKK97
- 
Eric Guerrino, Mike Kahn, and Ellen Kapito.
 User authentication and encryption overview, 1997.
- GL91
- 
T.D. Garvey and Teresa F. Lunt.
 Model-based Intrusion Detection.
 In Proceedings of the 14th National Computer Security
  Conference, pages 372-385, Octubre 1991.
- Gon97
- 
Marcus Goncalves.
 Firewalls Complete.
 McGrawHill, 1997.
- Gra00
- 
Robert David Graham.
 Network Intrusion Detection Systems FAQ v. 0.8.3, Marzo 2000.
 http://www.robertgraham.com/pubs/network-intrusion-detection.html.
- Gre99
- 
Peter H. Gregory.
 Solaris Security.
 Prentice Hall and Sun Microsystems Press, 1st edition, 1999.
- Gre00
- 
Mark Grennan.
 Firewall and Proxy Server HOWTO.
 http://www.linuxdoc.org/HOWTO/Firewall-HOWTO.html, 2000.
- GS96
- 
Simson Garfinkel and Eugene H. Spafford.
 Practical Unix & Internet Security.
 O'Reilly & Associates, 2nd edition, Abril 1996.
- GS97
- 
Simson Garfinkel and Eugene H. Spafford.
 Web Security & Commerce.
 O'Reilly & Associates, 1st edition, Junio 1997.
- GSTY96
- 
H. Gobioff, S. Smith, J.D. Tygar, and B. Yee.
 Smart cards in hostile environments.
 In Proceedings of the 2nd USENIX Workshop on Electronic
  Commerce. The USENIX Association, Noviembre 1996.
- Gun96
- 
Shishir Gundavaram.
 CGI Programming on the World Wide Web.
 O'Reilly & Associates, 1st edition, Marzo 1996.
- GUQ92
- 
Louis Claude Guillou, Michel Ugon, and Jean-Jacques Quisquater.
 The smart card - a standardized security device dedicated to public
  cryptology.
 In Contemporary Cryptology - The Science of Information
  Integrity, pages 561-614. IEEE Press, 1992.
- Gut96
- 
Peter Gutmann.
 Secure deletion of data from magnetic and solid-state memory.
 In Sixth USENIX Security Symposium Proceedings. The USENIX Association, Julio 1996.
- H+02
- 
Pete Herzot et al.
 Open-Source Security Testing Methodology Manual v2.0.
 Technical report, The Ideahamster Organization, Febrero 2002.
- Hal94
- 
Neil Haller.
 The S/KEY one time password system.
 In Proceedings of the ISOC Symposium on network and
  distributed systems security, Febrero 1994.
- HB96
- 
L. Todd Heberlein and Matt Bishop.
 Attack class: Address spoofing.
 In Proceedings of the 19th National Information Systems Security
  Conference, pages 371-377, Octubre 1996.
- HC83
- 
Richard C. Hollinger and John P. Clark.
 Theft by Employees.
 Lexington Books, 1983.
- Her00
- 
Peter Hernberg.
 User Authentication HOWTO.
 http://www.tldp.org/HOWTO/User-Authentication-HOWTO/, Mayo 2000.
- Hig88
- 
H.J. Highland.
 Electromagnetic Eavesdropping Machines for Christmas?
 Computers and Security, 7(4), 1988.
- HJAW88
- 
Matthew S. Hecht, Abhai Johri, Radhakrishna Aditham, and T. John Wei.
 Experience adding C2 Security Features to Unix.
 In USENIX Conference Proceedings, pages 133-146. The
  USENIX Association, Verano 1988.
- HLMS90
- 
Richard Heady, George Luger, Arthur Maccabe, and Mark Servilla.
 The architecture of a Network Level Intrusion Detection
  System.
 Technical Report CS90-20, University of New Mexico, Agosto 1990.
- HN+99
- 
Bao Ha, Tina Nguyen, et al.
 Slackware Linux Unleashed.
 Sams Publishing, 1999.
- HP96
- 
Hewlet-Packard.
 Managing HP-UX software with SD-UX.
 HP, Enero 1996.
 HP Part Number B2355-90107.
- HP00a
- 
Hewlett-Packard.
 HP-UX Patch Management: a guide to patching HP-UX 10.x
  systems.
 Hewlett-Packard, Enero 2000.
 HP Part Number B3782-90828.
- HP00b
- 
Hewlett-Packard.
 Managing Systems and Workgroups: A Guide for HP-UX System
  Administrators.
 Hewlett-Packard, 2000.
 HP Part Number B2355-90701.
- Hu91
- 
W. M. Hu.
 Reducing timing channels with fuzzy time.
 In Proceedings of the 1991 Symposium on Research in Security and
  Privacy, pages 8-20. IEEE Computer Society, Mayo 1991.
- Hun92
- 
Craig Hunt.
 TCP/IP Network Administration.
 O´Reilly & Associates, 1992.
- Huo98
- 
Simo Huopio.
 Biometric Identification.
 In Seminar on Network Security: Authorization and Access Control
  in Open Network Environment, 1998.
- HW01
- 
Kevin J. Houle and George M. Weaver.
 Trends in Denial of Service attack technology.
 Technical report, CERT Coordination Center, Carnegie Mellon
  University, Octubre 2001.
- IBM97a
- 
IBM.
 AIX Version 4.3 Problem Solving Guide and
  Reference.
 IBM, Octubre 1997.
 IBM RedBook SC23-4123.
- IBM97b
- 
IBM.
 AIX Version 4.3 System Management Guide:
  Communication and Networks.
 IBM, Octubre 1997.
 IBM RedBook SC23-4127.
- IBM97c
- 
IBM.
 AIX Version 4.3 System Management Guide: Operating
  System and Devices.
 IBM, Octubre 1997.
 IBM RedBook SC23-2529.
- IBM00a
- 
IBM.
 AIX 4.3 Elements of Security. Effective and Efficient
  Implementation.
 IBM, Agosto 2000.
 IBM RedBook SG24-5962-00.
- IBM00b
- 
IBM.
 IBM Certification Study Guide. AIX Problem
  Determination Tools and Techniques.
 IBM, Diciembre 2000.
 IBM RedBook SG24-6185-00.
- Ilg92
- 
Koral Ilgun.
 USTAT: A real-time intrusion detection system for unix.
 In Proceedings of the 1993 Symposium on Security and Privacy,
  pages 16-28. IEEE Computer Society, Mayo 1992.
- Ins97
- 
Shawn Instentes.
 Stack Smashing: What to do?
 ;login:, 22(2), Abril 1997.
- ISV95
- 
David Icove, Karl Seger, and William VonStorch.
 Computer Crime. A Crimefighter's handbook.
 O'Reilly & Associates, 1995.
- JF01
- 
David W. Chapman Jr. and Andy Fox.
 Cisco© Secure PIX© Firewalls.
 Cisco Press, 2001.
- JTY97
- 
Philippe Janson, Gene Tsudik, and Moti Yung.
 Scalability and flexibility in authentication services: The
  KryptoKnight Approach.
 In Proceedings of INFOCOM´97. IEEE Computer Society,
  1997.
- JV93
- 
Harold S. Javitz and Alfonso Valdes.
 The NIDES Statistical Component: Description and
  Justification.
 Technical report, SRI International, Marzo 1993.
- Kah67
- 
David Kahn.
 The Codebreakers.
 McMillan, 1967.
- Kat88
- 
J. Katz.
 Seductions of Crime: Moral and Sensual Attractions in Doing
  Evil.
 Basic Books, 1988.
- Kem98
- 
Richard A. Kemmerer.
 NSTAT: A Model-Based Real-Time Network
  Intrusion Detection System.
 Technical Report TRCS97-18, University of California, Junio 1998.
- KI99
- 
Gershon Kedem and Yuriko Ishihara.
 Brute force attack on Unix passwords with SIMD computer.
 In Proceedings of the 8th USENIX Security Symposium. The
  USENIX Association, Agosto 1999.
- Kir95
- 
Olaf Kirch.
 The Linux Network Administrators´ Guide.
 O´Reilly & Associates, 1995.
- KK92
- 
David Koblas and Michelle Koblas.
 Socks.
 In Proceedings of the Third Unix Security Symposium, pages
  77-83. The USENIX Association, Septiembre 1992.
- Kla95
- 
Christopher Klaus.
 Stealth Scanning - Bypassing Firewalls and SATAN
  Detectors, Diciembre 1995.
 Internet Security Systems, Inc.
- Kle90
- 
Daniel V. Klein.
 Foiling the cracker: A survey of, and improvements to, password
  security.
 In Unix Security Workshop, pages 5-14. The USENIX
  Association, Agosto 1990.
- KMM95
- 
R. Kohno, R. Meidan, and L.B. Milstein.
 Spread Spectrum Access Methods for Wireless Communications.
 IEEE Communications Magazine, 33:58-67, Enero 1995.
- Ko96
- 
Calvin Cheuk Wang Ko.
 Execution Monitoring of Security-Critical Programs in a
  Distributed System: A Specification-Based Approach.
 PhD thesis, University of California at Davis, 1996.
- KP84
- 
Brian W. Kernighan and Rob Pike.
 The Unix Programming Environment.
 Prentice Hall, 1984.
- KS93
- 
Gene H. Kim and Eugene H. Spafford.
 The design and implementation of Tripwire: A file system integrity
  checker.
 Technical Report CSD-TR-93-071, Purdue University, Noviembre 1993.
- KS94a
- 
Gene H. Kim and Eugene H. Spafford.
 Experiences with Tripwire: using integrity checkers for intrusion
  detection.
 In Systems Administration, Networking and Security Conference
  III. The USENIX Association, Abril 1994.
- KS94b
- 
Gene H. Kim and Eugene H. Spafford.
 Writing, supporting and evaluating Tripwire: a publically available
  security tool.
 In Proceedings of the USENIX Applications Development
  Symposium. The USENIX Association, 1994.
- KS94c
- 
Sandeep Kumar and Eugene Spafford.
 An Application of Pattern Matching in Intrusion Detection.
 Technical Report CSD-TR-94-013, Purdue University, Marzo 1994.
- KT97
- 
Micki Krause and Harold F. Tipton.
 Handbook of Information Security Management.
 CRC Press LLC, 1997.
- Kum95
- 
Sandeep Kumar.
 Classification and Detection of Computer Intrusions.
 PhD thesis, Purdue University, Agosto 1995.
- L+92
- 
Teresa F. Lunt et al.
 A real-time intrusion detection expert system (IDES). final
  technical report.
 Technical report, SRI International, Febrero 1992.
- Lam73
- 
B. W. Lampson.
 A note on the Confinement Problem.
 Communications of the ACM, 16(10):613-615, Octubre 1973.
- Lam81
- 
Leslie Lamport.
 Password authentication with insecure communication.
 Communications of the ACM, 24(11):770-772, Noviembre 1981.
- Lap91
- 
J.C. Laprie.
 Dependability: Basic concepts and terminology.
 Springer-Verlag, 1991.
- LBMC94
- 
Carl E. Landwher, Alan R. Bull, John P. McDermott, and William S. Choi.
 A taxonomy of computer program security flaws, with examples.
 ACM Computing Surveys, 3(26), Septiembre 1994.
- Lip75
- 
Steven B. Lipner.
 A note on the Confinement Problem.
 Operating Systems Review, 9(5):192-196, Noviembre 1975.
- Lis95
- 
Justin Jay Lister.
 Intrusion Detection Systems: an Introduction to the
  detection and prevention of computer abuse.
 PhD thesis, University of Wollongong, 1995.
- LU02
- 
Juan Miguel Velasco López-Urda.
 Seguridad bajo control: `outsourcing vs. in house', las claves
  para evaluar.
 Seguridad en Informática y Comunicaciones, (49), Abril 2002.
- Lun90
- 
Teresa F. Lunt.
 Detecting Intruders in Computer Systems.
 In Proceedings of the Sixth Annual Symposium and Technical
  Displays on Physical and Electronic Security, 1990.
- MA94
- 
Roger Merckling and Anne Anderson.
 RFC 57.0: Smart Card Introduction, Marzo 1994.
- Mai96
- 
Uriel Maimon.
 Port Scanning without the SYN flag.
 Phrack Magazine, 7(49), 1996.
- Man91
- 
Jason Manger.
 Unix: The complete book.
 Sigma Press, 1991.
- Man96
- 
U. Manber.
 A simple scheme to make passwords based on One-Way functions much
  harder to crack.
 Computers & Security, 15(2):171-176, 1996.
- Mar88a
- 
John Markhoff.
 Author of computer `virus' is son of U.S. electronic security
  expert.
 The New York Times, 5 Noviembre 1988.
- Mar88b
- 
John Markhoff.
 A family´s passion for computers, gone sour.
 The New York Times, 11 Noviembre 1988.
- McC00
- 
Ron McCarthy.
 IP Filter on Solaris.
 Sys Admin Magazine, 2000.
 Solaris Suplement.
- McH95
- 
John McHugh.
 Covert channel analysis.
 In Handbook for the Computer Security Certification of Trusted
  Systems. Naval Research Laboratory, Enero 1995.
- McI89
- 
M. Douglas McIlroy.
 Virology 101.
 In USENIX Computing Systems, volume 2, 1989.
- McM97
- 
Dave McMordie.
 Texture analysis of the human iris for high security authentication.
 Technical Report Image Processing 304-529, Department of Electrical
  Engineering, McGill University, Diciembre 1997.
- Mel97
- 
Mark K. Mellis.
 Surprises in the DMZ.
 ;login:, 22(1), Febrero 1997.
- Men98
- 
Phunda Menta.
 Linux and random source bleaching.
 Phrack Magazine, 8(54), 1998.
- Mey89
- 
Gordon R. Meyer.
 The Social Organization of the Computer Underground.
 PhD thesis, Northern Illinois University, 1989.
- MF96
- 
Gary McGraw and Edward Felten.
 Java Security: Hostile Applets, Holes and Antidotes.
 John Wiley and Sons, 1996.
- MFS90
- 
Barton P. Miller, Lars Fredriksen, and Bryan So.
 An empirical study of the reliability of Unix utilities.
 Communications of the ACM, 33(12):32-44, Diciembre 1990.
- Mic98
- 
Sun Microsystems.
 Solaris 7 System Administration Guide, Volume I, Octubre
  1998.
 http://docs.sun.com/.
- MK94
- 
Ira S. Moskowitz and Myong H. Kang.
 Covert Channels - Here to Stay?
 In Proceedings of COMPASS´94, pages 235-243. IEEE
  Press, Junio 1994.
- MK99
- 
Andrew D. McDonald and Markus G. Kuhn.
 StegFS: A Steganographic File System for Linux.
 In Andreas Pfitzmann, editor, Information Hiding, pages
  461-475. Springer-Verlag, 1999.
- MKL+95
- 
Barton P. Miller, David Koski, Cjin Pheow Lee, Vivekananda Maganty, Ravi
  Murthy, Ajitkumar Natarajan, and Jeff Steidl.
 Fuzz revisited: A re-examination of the reliability of Unix
  utilities and services.
 ftp://grilled.cs.wisc.edu/technical_papers/fuzz-revisited.ps,
  1995.
- MM00
- 
Jim Mauro and Richard McDougall.
 Solaris Internals: Core Kernel Architecture.
 Prentice Hall and Sun Microsystems Press, 1st edition, 2000.
- MNSS87
- 
S.P. Miller, B.C. Neuman, J.I. Schiller, and J.H. Saltzer.
 Kerberos Authentication and Authorization System.
 In Project Athena Technical Plan, chapter E.2.1.
  Massachusetts Institute of Technology, Diciembre 1987.
- Mog89
- 
Jeffrey C. Mogul.
 Simple and flexible datagram access control for Unix-based
  gateways.
 In Proceedings of the USENIX Summer Conference, pages
  203-221. The USENIX Association, 1989.
- Mor85
- 
Robert Morris.
 A Weakness in the 4.2BSD Unix TCP/IP Software.
 Technical Report CSTR-117, AT&T Bell Laboratories,
  1985.
- Mou00
- 
Gerhard Mourani.
 Get acquainted with Linux Security and Optimization System.
 Technical report, Open Network Architecture, Enero 2000.
- MPS+93
- 
Sead Muftic, Ahmed Patel, Peter Sanders, Rafael Colon, Jan Heijnsdijk, and Unto
  Pulkkinen.
 Security in Open Systems.
 John Wiley and Sons, 1993.
- MS98
- 
Nimisha V. Mehta and Karen R. Sollins.
 Expanding and extending the security features of Java.
 In Proceedings of the 7th USENIX Security Symposium. The
  USENIX Association, Enero 1998.
- MT79
- 
Robert Morris and Ken Thompson.
 Password security: A case history.
 Communications of the ACM, 22(11), Noviembre 1979.
- MTHZ92
- 
Refik Molva, Gene Tsudik, Els Van Herrenweghen, and Stefano Zatti.
 KryptoKnight Authentication and Key Distribution Service.
 In Proceedings of ESORICS 92, Octubre 1992.
- MvOV96
- 
Alfred J. Menezes, Paul C. van Oorschot, and Scott A. Vanstone.
 Handbook of Applied Cryptography.
 CRC Press, Octubre 1996.
- NB01a
- 
Alex Noordergraaf and Glenn Brunette.
 The Solaris Security Toolkit - Installation,
  Configuration and Usage Guide.
 Sun Microsystems, Junio 2001.
 Sun BluePrints OnLine.
- NB01b
- 
Alex Noordergraaf and Glenn Brunette.
 The Solaris Security Toolkit - Internals.
 Sun Microsystems, Junio 2001.
 Sun BluePrints OnLine.
- NB01c
- 
Alex Noordergraaf and Glenn Brunette.
 The Solaris Security Toolkit - Quick Start.
 Sun Microsystems, Junio 2001.
 Sun BluePrints OnLine.
- NB01d
- 
Alex Noordergraaf and Glenn Brunette.
 The Solaris Security Toolkit - Release Notes.
 Sun Microsystems, Junio 2001.
 Sun BluePrints OnLine.
- Noo01
- 
Alex Noordergraaf.
 Building a JumpStart Infrastructure.
 Sun Microsystems, Abril 2001.
 Sun BluePrints OnLine.
- Nor99
- 
Stephen Northcutt.
 Network Intrusion Detection: An Analyst´s Handbook.
 New Riders, 1999.
- NS78
- 
R.M. Needham and M.D. Schroeder.
 Using encryption for authentication in large networks of computers.
 Communications of the ACM, 21(12):993-999, Diciembre 1978.
- NSS89
- 
Evi Nemeth, Garth Snyder, and Scott Seebass.
 Unix System Administration Handbook.
 Prentice Hall, 1989.
- NW99
- 
Alex Noordergraaf and Keith Watson.
 Solaris Operating Environment Network Settings for
  Security.
 Sun Microsystems, Diciembre 1999.
 Sun BluePrints OnLine.
- Olo92
- 
Tomas Olovsson.
 A structured approach to computer security.
 Technical Report 122, Chalmers University of Technology, 1992.
- One96
- 
Aleph One.
 Smashing the stack for fun and profit.
 Phrack Magazine, 7(49), Noviembre 1996.
- Org88
- 
International Standards Organization.
 Information Processing Systems - OSI RM.
 Technical Report 97 7498-2, ISO/TC, 1988.
 Part 2: Security Architecture.
- oS80
- 
National Bureau of Standars.
 DES Modes of Operation.
 Technical Report NBS FIPS PUB 81, U.S. Department of Commerce,
  Dicembre 1980.
- oST84
- 
National Institute of Standards and Technology.
 Digital Signature Standard.
 Technical Report NIST FIPS PUB 185, U.S. Department of Commerce, Mayo
  1984.
- OT88
- 
Tim O´Reilly and Grace Todino.
 Managing UUCP and UseNet.
 O'Reilly & Associates, Marzo 1988.
- otUAH90
- 
Department of the US Army Headquarters.
 Basic cryptanalysis.
 Technical Report FM-34-40-2, United States Army, Septiembre 1990.
- P+94
- 
Susan Peppard et al.
 Unix Unleashed.
 Sams Publishing, 1st edition, 1994.
- Par81
- 
Donn B. Parker.
 Computer Security Management.
 Prentice Hall, 1981.
- Par94
- 
Donn B. Parker.
 Demonstrating the elements of information security with threats.
 In Proceedings of the 17th National Computer Security
  Conference, pages 421-430, 1994.
- Par98
- 
William Parkhurst.
 Cisco Router OSPF Design and Implementation Guide.
 McGrawHill, 1998.
- PB93
- 
W. Timothy Polk and Lawrence E. Bassham.
 Security issues in the Database Language SQL, Julio 1993.
- Pfl97
- 
Charles P. Pfleeger.
 Security in computing.
 Prentice Hall, 1997.
- Phi97
- 
Ken Phillips.
 Biometric identification comparison chart.
 PC Week, Marzo 1997.
- Pit00
- 
Jesús Pita.
 La tarjeta inteligente como medio de identificación electrónica y
  acceso a servicios de seguridad: la experiencia de la FNMT-RCM.
 Seguridad en Informática y Comunicaciones, (39), Abril 2000.
- PK91
- 
P.A. Porras and R.A. Kemmerer.
 Analyzing covert storage channels.
 In Proceedings of the 1991 Symposium on Research in Security and
  Privacy, pages 36-51. IEEE Computer Society, Mayo 1991.
- PK92
- 
P.A. Porras and R.A. Kemmerer.
 Penetration state transition analysis: a rule-based intrusion
  detection approach.
 In Proceedings of the 8th Computer Security Application
  Conference, pages 220-229, Noviembre 1992.
- Pla83
- 
José Plans.
 La pratique de l´audit informatique.
 Eyrolles, 1983.
- PN92
- 
Norman E. Proctor and Peter G. Neumann.
 Architectural implications of Covert Channels.
 In Proceedings of the 15th National Computer Security
  Conference, pages 28-43, Octubre 1992.
- Por92
- 
Phillip A. Porras.
 STAT: A State Transition Analysis Tool for
  Intrusion Detection.
 PhD thesis, University of California, Junio 1992.
- PP01
- 
Marty Poniatowski and Martin Poniatowski.
 HP-UX 11i System Administration Handbook and Toolkit.
 Prentice Hall, Abril 2001.
- PPK93
- 
Pinkas, Parker, and Kaijser.
 SESAME: An Introduction, 1993.
- RA94
- 
Marcus J. Ranum and Frederick M. Avolio.
 A toolkit and methods for internet firewalls.
 In Proceedings of the Technical Summer Conference, pages
  37-44. The USENIX Association, Junio 1994.
- Rad92
- 
Peter V. Radatti.
 Computer virus awareness for UNIX.
 NCSA News, 3:8, Mayo 1992.
- Rad93
- 
Peter V. Radatti.
 The plausibility of UNIX virus attacks.
 Technical report, Cybersoft, Inc., 1993.
- Rad95
- 
Peter V. Radatti.
 Computer viruses in Unix networks.
 Technical report, Cybersoft, Inc., 1995.
- Rad97
- 
Peter V. Radatti.
 MrMean the hacker.
 ;login:, Octubre 1997.
- Ran93
- 
Marcus J. Ranum.
 Thinking about Firewalls.
 In Proceedings of the Second SANS Conference, Abril 1993.
- Ran95
- 
Marcus J. Ranum.
 Firewalls Frequently Asked Questions, 1995.
- Ran98
- 
Marcus J. Ranum.
 Intrusion Detection: Challenges and Myths.
 Technical report, Network Flight Recorder, Inc., 1998.
- Ran00
- 
Marcus J. Ranum.
 The network police blotter.
 ;login:, 25(5), Agosto 2000.
- RCG96
- 
A. Ribagorda, A. Calvo, and M.A. Gallardo.
 Seguridad en Unix: Sistemas Abiertos e Internet.
 Paraninfo, 1996.
- Reh00
- 
Rafeeg Rehman.
 HP Certified: HP-UX System Administration.
 Prentice Hall, Mayo 2000.
- Rei89
- 
N. Reichman.
 Breaking confidences: Organizational influences on insider trading.
 The Sociological Quarterly, 30:185-204, 1989.
- Ris01
- 
Neil B. Riser.
 An overview of some the current spoofing threats, Julio 2001.
 The SANS Institute.
- Rit86
- 
Dennis M. Ritchie.
 On the security of UNIX.
 In UNIX System Manager's Manual, 4.3 BSD, Virtual VAX-11
  Version, pages 17:1-3. University of California, Berkeley, CA, Abril 1986.
- Riv90
- 
Ron Rivest.
 The MD4 message digest algorithm.
 In Crypto´90 Abstracts, pages 281-291, Agosto 1990.
- Riv92
- 
Ron Rivest.
 The MD5 message digest algorithm, Abril 1992.
 Internet Request for Comments 1321.
- Rob94
- 
Andrew T. Robinson.
 Internet Firewalls: An Introduction.
 Technical report, NetMAINE, P.O. BOX 8258, Portland, ME 04104-8258,
  USA, 1994.
- Roe99
- 
Martin Roesch.
 Snort - Lightweight Intrusion Detection for Networks.
 In Proceedings of the 13th Systems Administration Conference -
  LISA´99. The USENIX Association, Noviembre 1999.
- Rou96
- 
Route.
 Project Loki: ICMP Tunnelling.
 Phrack Magazine, 7(49), Noviembre 1996.
- Row96
- 
Craig H. Rowland.
 Covert Channels in the TCP/IP Protocol Suite, 1996.
- Roy88
- 
Mike Royko.
 Here´s how to stop computer vandals.
 The Chicago Tribune, 7 Noviembre 1988.
- Rus00
- 
Rusty Russell.
 Linux ipchains HOWTO, v. 1.0.8.
 http://www.linuxdoc.org/HOWTO/IPCHAINS-HOWTO.html, Julio 2000.
- Rus02
- 
Rusty Russell.
 Linux 2.4 Packet Filtering HOWTO v. 1.2.
 http://netfilter.samba.org/documentation/HOWTO/packet-filtering-HOWTO.txt,
  2002.
- RW84
- 
James A. Reeds and Peter J. Weinberger.
 File security and the UNIX system crypt command.
 AT&T Bell Labs Technical Journal, 63(8):1673-1683, Octubre
  1984.
- Sal90
- 
A. Salomaa.
 Public Key Cryptography.
 Springer-Verlag, 1990.
- SBL90
- 
Corey Sandler, Tom Badgett, and Larry Lefkowitz.
 VAX Security: Protecting the System and the Data.
 John Wiley and Sons, 1990.
- Sch94
- 
Bruce Schneier.
 Applied Cryptography: Protocols, Algorithms and Source Code in
  C.
 John Wiley & Sons, 1994.
- Sch97
- 
John Schimmel.
 A historical look at firewall technologies.
 ;login:, 22(1), Febrero 1997.
- See89
- 
Donn Seeley.
 A tour of the Worm.
 In Proceedings of 1989 Winter USENIX Conference. The USENIX Association, Febrero 1989.
- Sei99
- 
Kurt Seifried.
 Linux Administrator´s Security Guide.
 http://www.securityportal.com/lasg/, 1999.
- Sem96
- 
Chuck Semeria.
 Internet Firewalls and Security.
 Technical report, 3Com, 1996.
- Ser91
- 
Omri Serlin.
 SVR4 may become the first truly secure Unix.
 UNIXWORLD, VIII(11):39-40, Noviembre 1991.
- SG91
- 
Shiuhpyng Winston Shieh and Virgil D. Gligor.
 A pattern-oriented intrusion model and its applications.
 In Proceedings of the 1991 IEEE Computer Society Symposium on
  Research in Security and Privacy, pages 327-342. IEEE Computer
  Society, Mayo 1991.
- SH82
- 
John F. Shoch and Jon A. Hupp.
 The worm programs - early experience with a distributed computation.
 Communications of the ACM, 25(3):172-180, Marzo 1982.
- SH95
- 
Karanjit Siyan and Chris Hare.
 Internet y seguridad en redes.
 Prentice Hall, 1995.
- Sha49
- 
C. E. Shannon.
 Communication theory of secrecy systems.
 Bell Systems Technology Journal, 28:657-715, 1949.
- Sho00
- 
Adam Shostack.
 Security code review guidelines, 2000.
- Sim90
- 
Steve Simmons.
 Life without root.
 In Proceedings of the 4th Systems Administration Conference -
  LISA´90. The USENIX Association, Octubre 1990.
- SK98
- 
Bruce Schneier and John Kelsey.
 Cryptographic support for secure logs on untrusted machines.
 In Proceedings of the 7th USENIX Security Symposium. The
  USENIX Association, Enero 1998.
- Skl01
- 
Sandor W. Sklar.
 The AIX Error Logging Facility.
 Sys Admin, 10(6), Junio 2001.
 AIX Administration Supplement.
- SM70
- 
Gresham Sykes and David Matza.
 Techniques of Neutralization: A Theory of Delinquency.
 In Marvin E. Wolfgang et al., editors, The Sociology of Crime
  and Delinquency, pages 292-299. John Wiley and Sons, 2nd edition, 1970.
- Smi92
- 
Martin Smith.
 Personnel Security.
 In Keith M. Jackson and Jan Hruska, editors, Computer Security
  Reference Book, chapter 33, pages 417-436. Butterworth-Heinemann, 1992.
- Smi97
- 
Nathan P. Smith.
 Stack Smashing Vulnerabilities in the Unix Operating
  System, 1997.
 http://millcomm.com/~nate/machines/security/stack-smashing/.
- Smu90
- 
Peter Smulders.
 The Threat of Information Theft by Reception of
  Electromagnetic Radiation from RS-232 Cables.
 Computers and Security, 9(1), 1990.
- Spa88
- 
Eugene H. Spafford.
 The Internet Worm program: An analysis.
 Technical Report CSD-TR-823, Purdue University Department of Computer
  Science, 1988.
- Spa89
- 
Eugene H. Spafford.
 The Internet Worm: Crisis and aftermath.
 Communications of the ACM, 32(6):678-687, 1989.
- Spa90
- 
Eugene H. Spafford.
 Are computer hacker break-ins ethical?
 Technical Report CSD-TR-994, Purdue University, Julio 1990.
- Spa91a
- 
Eugene H. Spafford.
 The Internet Worm incident.
 Technical Report CSD-TR-933, Purdue University Department of Computer
  Science, 1991.
- Spa91b
- 
Eugene H. Spafford.
 OPUS: Preventing weak password choices.
 In Proceedings of the 14th National Computer Security
  Conference, pages 446-455, Octubre 1991.
- Spi01a
- 
Lance Spitzner.
 Intrusion Detection for Check Point FireWall-1.
 http://www.enteract.com/~lspitz/intrusion.html, Diciembre 2001.
- Spi01b
- 
Lance Spitzner.
 Know your enemy: Honeynets.
 http://project.honeynet.org/papers/honeynet/, 2001.
- Spr01
- 
Ian P. Springer.
 HP-UX FAQ, Noviembre 2001.
 http://www.faqs.org/faqs/hp/hpux-faq/.
- Sta00
- 
British Standard.
 Information technology - Code of practice for information security
  management.
 Technical Report BS ISO/IEC 17799:2000, British Standard Publishing
  Limited, Diciembre 2000.
- Ste90
- 
W. Richard Stevens.
 Unix Network Programming.
 Prentice Hall, 1990.
- Ste94
- 
W. Richard Stevens.
 TCP/IP Illustrated Volume I: The Protocols.
 Addison Wesley, 1994.
- Ste98a
- 
Ingo Stengel.
 Security architectures based on active firewall components, 1998.
 FH-Darmstadt.
- Ste98b
- 
Kevin Steves.
 Building a bastion host using HP-UX 10.
 http://people.hp.se/stevesk/bastion10.html, 1998.
- Ste00
- 
Kevin Steves.
 Building a bastion host using HP-UX 11.
 http://people.hp.se/stevesk/bastion11.html, 2000.
- Sto88
- 
Cliff Stoll.
 Stalking the wily hacker.
 Communications of the ACM, 31(5):484-497, Mayo 1988.
- Sto89
- 
Cliff Stoll.
 The Cuckoo's Egg.
 Doubleday, 1989.
- Sun96
- 
Aurobindo Sundaram.
 An introduction to Intrusion Detection.
 Crossroads: The ACM Student Magazine, 2(4), Abril 1996.
- Swi92
- 
Peter Swinbank.
 Electromagnetic Radiation.
 In Keith M. Jackson and Jan Hruska, editors, Computer Security
  Reference Book, chapter 11, pages 75-90. Butterworth-Heinemann, 1992.
- Tan91
- 
Andrew Tanenbaum.
 Operating Systems: Design and Implementation.
 Prentice Hall, 1991.
- Tan95
- 
Andrew Tanenbaum.
 Distributed Operating Systems.
 Prentice Hall, 1995.
- Tan96
- 
Andrew Tanenbaum.
 Computer Networks.
 Prentice Hall, 1996.
- Tho84
- 
Ken Thompson.
 Refections on trusting trust.
 Communications of the ACM, 27(8), Agosto 1984.
- Thu00
- 
Thuull.
 Anomaly Detection Systems.
 2600: The Hacker Quartely, 17(3), Primavera 2000.
- Tom75
- 
Raymond S. Tomlinson.
 Selecting Sequence Numbers.
 In Proceedings of SIGCOMM/SIGOPS Interprocess
  Communication Workshop, pages 11-23. ACM, 1975.
- Tom94
- 
Chris Tomlinson.
 A Practical Guide to Solaris Security.
 Technical report, Sun Microsystems (UK), Marzo 1994.
- Tox00
- 
Bob Toxen.
 Real World Linux Security: Intrusion Prevention,
  Detection and Recovery.
 Prentice Hall, 1st edition, 2000.
- TW93
- 
G. Winfield Treese and Alec Wolman.
 X through the firewall, and other applications relays.
 In Proceedings of the USENIX Summer Conference. The USENIX Association, Junio 1993.
- TY82
- 
Rebecca Thomas and Jean Yates.
 A User Guide to the Unix System.
 McGrawHill, 1982.
- V+00
- 
Scott Vetter et al.
 IBM Certification Study Guide. AIX v4.3 System
  Administration.
 IBM, 2000.
 IBM RedBook SG24-5129-00.
- vE85
- 
Wim van Eck.
 Electromagnetic Radiation from Video Display Units: An
  Eavesdropping Risk?
 Computers and Security, 4(4), 1985.
- Ven92
- 
Wietse Venema.
 TCP Wrapper: Network monitoring, access control and booby traps.
 In Proceedings of the 3rd USENIX Unix Security
  Symposium, pages 85-92. The USENIX Association, Septiembre 1992.
- Vic94
- 
Bob Vickers.
 Guide to safe X, Febrero 1994.
- vKPG97
- 
Robert van Kralingen, Corien Prins, and Jan Grijpink.
 Using your body as a key: legal aspects of biometrics, 1997.
- Vol97
- 
Yuri Volobuev.
 Playing redir games with ARP and ICMP, Septiembre 1997.
- vSS98
- 
Carl van Schaik and Paul Smeddle.
 A Steganographic File System Implementation for Linux.
 Technical report, University of Cape Town (South Africa), Octubre
  1998.
- vSTO94
- 
R. G. van Schyndel, A. Z. Tirkel, and C. F. Osborne.
 A digital watermark.
 In International Conference on Image Processing, volume 2,
  pages 86-90. IEEE, 1994.
- WA02
- 
Dameon D. Welch-Abernathy.
 Essential Checkpoint Firewall-1: An Installation, Configuration,
  and Troubleshooting Guide.
 Addison Wesley, 2002.
- WC94
- 
John P. Wack and Lisa J. Carnahan.
 Keeping your site comfortably secure: an introduction to Internet
  Firewalls.
 Technical report, National Institute of Standards and Technology
  (NIST), Diciembre 1994.
 Special Publication 800-10.
- WD95
- 
Ira S. Winkler and Brian Dealy.
 Information security technology?...Don´t rely on it. A case
  study in social engineering.
 In Proceedings of the 5th USENIX Unix Security Symposium.
  The USENIX Association, Junio 1995.
- Wil74
- 
M. J. Williamson.
 Non-Secret encryption using a finite field.
 Technical report, CESG, Enero 1974.
- Wil76
- 
M. J. Williamson.
 Thoughts on cheaper Non-Secret encryption.
 Technical report, CESG, Agosto 1976.
- Won01
- 
Chris Wong.
 HP-UX 11i Security.
 Prentice Hall, Septiembre 2001.
- Wra91a
- 
J.C. Wray.
 An analysis of covert timing channels.
 In Proceedings of the 1991 Symposium on Research in Security and
  Privacy, pages 2-7. IEEE Computer Society, Mayo 1991.
- Wra91b
- 
J.W. Wray.
 Toward a mathematical foundation for information flow security.
 In Proceedings of the 1991 Symposium on Research in Security and
  Privacy, pages 21-34. IEEE Computer Society, Mayo 1991.
- Wre98
- 
Dave Wreski.
 Linux Security Administrator´s Guide.
 http://nic.com/~dave/Security/, 1998.
- Ylo96
- 
Tatu Ylonen.
 SSH - Secure login connetions over the Internet.
 In Proceedings of the 6th USENIX Security Symposium,
  pages 37-42. The USENIX Association, Julio 1996.
- Zie01
- 
Robert L. Ziegler.
 Linux Firewalls.
 New Riders, 2nd edition, 2001.
- Zim95a
- 
Phil Zimmermann.
 The Official PGP User´s Guide.
 M.I.T. Press, 1995.
- Zim95b
- 
Phil Zimmermann.
 PGP: Source Code and Internals.
 M.I.T. Press, 1995.
Subsecciones
2003-08-08