next up previous contents index
Nächste Seite: Index Aufwärts: dip Vorherige Seite: Schlußbemerkung   Inhalt   Index

Literatur

CERT-1
An Analysis Of Security Incidents On The Internet 1989 - 1995 John, D. Howard http://www.cert.org/research/JHThesis/Start.html

CERT-2
- Security of the Internet - The Froehlich/Kent Encyclopedia of Telecommunications vol. 15. Marcel Dekker, New York 1997, pp. 231-255 http://www.cert.org/encyc_article/tocencyc.html

fwstud
http://www.bsi.bund.de/literat/studien/fw-stud.htm - Firewallstudie im Auftrag des BSI - Andreas Bonnard, Christian Wolff, SIEMENS AG Zentralabteilung Technik ZT IK 3

CA-96.21
- TCP SYN Flooding and IP Spoofing Attacks - http://www.cert.org/advisories/CA-96.21.tcp_syn_flooding.html

sii
- http://www.sicherheit-im-internet.de/ -

RIPE
- RIPE Network Coordination Centre http://www.ripe.net/ -

ca-99.02
- Trojan-Horses - http://www.cert.org/advisories/CA-99-02-Trojan-Horses.html

bsi-1
- http://www.bsi.de/literat/viren/ -

ca-99.04
- Melissa-Macro-Virus - http://www.cert.org/advisories/CA-99-04-Melissa-Macro-Virus.html

FSI-96
- Firewalls und Sicherheit im Internet - William R. Cheswick, Steven M. Bellovin, S 26,S 27,S 35, 36, S 37,S 42, S 61, S 142, S 144, S 194

worm
- Internet Worm - ftp://coast.cs.purdue.edu/pub/Purdue/papers/spafford/spaf-IWorm-paper-CCR.ps.Z

CT-8/99
- Sicherheitslücke im InternetExplorer 5 - CT 8/99 S 27

CT-3/99
- Warnung vor gefälschter EMail - CT 3/99 S. 143

RuG91
- Computer Security Basics - Deborah Russel and G. T. Gangemi O'Reilly & Associates, Inc. 1991

RFC-1858
- RFC 1858 - http://www.rfc-editor.org/ -

CA-96.26
- Denial-of-Service Attack via ping - http://www.cert.org/advisories/CA-96.26.ping.html

Morris-85
- A Weakness in the 4.2 BSD Unix TCP/IP Software - Robert T. Morris, ftp://ftp.research.att.com/dist/internet_security/117.ps.Z

Bellovin-89
- Security Problems in the TCP/IP Protocol Suite - S. M. Bellovin ftp://ftp.research.att.com/dist/internet_security/ipext.ps.Z

CA-97.28
- IP Denial-of-Service-Attacks - http://www.cert.org/advisories/CA-97.28.Teardrop_Land.html

CA-95.01
- IP Spoofing Attacks and Hijacked Terminal Connections - http://www.cert.org/advisories/CA-95.01.IP.spoofing.attacks.and.hijacked.terminal.connections.html

CA-96.01
- UDP Port Denial-of-Service Attack - http://www.cert.org/advisories/CA-96.01.UDP_service_denial.html

BIF-96
- Building Internet Firewalls - D. Brent Chapman, Elizabeth D. Zwicky, S 18, S 66, S 149, S 218, S 221, S 224, S 225, S 312

CA-94.15
- NFS Vulnerabilities - http://www.cert.org/advisories/CA-94.15.NFS.Vulnerabilities.html

CA-95.03a
- Telnet encryption vulnerability - http://www.cert.org/advisories/CA-95.03a.telnet.encryption.vulnerability.html

CA-95.14
- Telnetd Environment Vulnerability - http://www.cert.org/advisories/CA-95.14.Telnetd_Environment_Vulnerability.html

CA-97.27
- FTP Bounce - http://www.cert.org/advisories/CA-97.27.FTP_bounce.html

CA-FTP-Port
- Problems With The FTP PORT Command - ftp://ftp.cert.org/pub/tech_tips/FTP_PORT_attacks

CA-91.18
- Acitve Internet tftp Attacks - http://www.cert.org/advisories/CA-91.18.Active.Internet.tftp.Attacks.html

CA-88.01
- ftpd vulnerability - http://www.cert.org/advisories/CA-88.01.ftpd.hole.html

CA-94.08
-ftpd Vulnerabilities - http://www.cert.org/advisories/CA-94.08.ftpd.vulnerabilities.html

CA-95.16
- wu-ftpd Misconfigruation Vulnerability - http://www.cert.org/advisories/CA-95.16.wu-ftpd.vul.html

CA-97.26
ftpd Signal Handling Vulnerability http://www.cert.org/advisories/CA-97.16.ftpd.html

CA-99.03
Advisory CA-99-03-FTP-Buffer-Overflows http://www.cert.org/advisories/CA-99-03-FTP-Buffer-Overflows.html

Black-95
TCP/IP and Related Protocols, Uyless Black, McGraw-Hill, Inc. 1995

CT-14/99
- Sicherheitslücke im Internet Information Server CT, S. 19

CA-99.07
- IIS Buffer Overflow - http://www.cert.org/advisories/CA-99-07-IIS-Buffer-Overflow.html

uucp
- Manging UUCP and Usenet - Tim O'Reilly, Grace Todino, O'Reilly & Associates, Inc. 1991

CA-97.11
- Vulnerability in libXt - http://www.cert.org/advisories/CA-97.11.libXt.html

CA-93.17
- xterm Logging Vulnerability - http://www.cert.org/advisories/CA-93.17.xterm.logging.vulnerability.html

Hunt-98
TCP/IP Network Administration, Second Edition, Craig Hunt, O'Reilly & Associates, Inc.

Huit
Routing im Internet, Huitema Ch, Prentice Hall 1996

LdD-V.7.0
- Lexikon der Datenkommunikation, V.7.0 - http://www.datacom-bookstore.de/default.html

SKI
Sicherheitskonzepte für das Internet, Martin Raepple S.6

SiI
Sicherheit im Internet, Othmar Kyas, S 177, S 283

Schneier
Applied Cryptography: Protokols, Algorithms, and Source Code in C, Schneier Bruce, NY: John Wiley & Sons, 1996

PUIS
Practical Unix & Internet Securitya, Simson Garfinkel und Gene Spafford, 2. Auflage April 1996 S 578



Klaus Bauer 1999-10-20