Local Area Networks (LANs) in Aircraft - FTP Directory Listing - FAA
Local Area Networks (LANs) in Aircraft - FTP Directory Listing - FAA
Local Area Networks (LANs) in Aircraft - FTP Directory Listing - FAA
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
21. Dunn, J.E., “Crypto Malware Close to Be<strong>in</strong>g ‘Uncrackable,’” ComputerWorld, Security,<br />
July 25, 2006.<br />
http://www.computerworld.com/action/article.do?command=viewArticleBasic&articleId<br />
=9001997&source=NLT_VVR&nlid=37<br />
22. Rob<strong>in</strong>son, D., “Safety Security Type Design Approval Consideration,” 2006 Software<br />
and Complex Electronic Hardware Conference, Atlanta, GA, June 28, 2006.<br />
23. Cheswick, W., Bellov<strong>in</strong>, S., and Rub<strong>in</strong>, A., “Firewalls and Internet Security, Second<br />
Edition—Repell<strong>in</strong>g the Wily Hacker,” Addison-Wesley, 2003.<br />
24. Wang, Y. and Strider, M., “HoneyMonkeys: Active Client-Side Honeypots for F<strong>in</strong>d<strong>in</strong>g<br />
Web Sites That Exploit Browser Vulnerabilities,” Part of Works <strong>in</strong> Progress at the 14 th<br />
Usenix Security Symposium, Baltimore, July 31-August 5, 2005.<br />
http://www.usenix.org/events/sec05/wips/wang.pdf and<br />
http://research.microsoft.com/HoneyMonkey/<br />
25. Weiss, T., “Trojan Horse Captured Data on 2,300 Oregon Taxpayers From Infected<br />
Gov’t PC,” Computerworld, Government, electronic version, June 15, 2006.<br />
http://www.computerworld.com/action/article.do?command=viewArticleBasic&articleId<br />
=9001222&source=NLT_VVR&nlid=37<br />
26. Spitzner, L., Honeypots—Track<strong>in</strong>g Hackers, Addison Wesley, 2003, pp. 11-12.<br />
27. Ward, M., “Track<strong>in</strong>g Down Hi-Tech Crime,” BBC News, Sunday, October 8, 2006.<br />
http://news.bbc.co.uk/2/hi/technology/5414502.stm<br />
28. Osterman, M., “Malware is Gett<strong>in</strong>g Very Serious,” NetworkWorld Magaz<strong>in</strong>e, September<br />
28, 2006.<br />
http://www.networkworld.com/newsletters/gwm/2006/0925msg2.html<br />
29. Messmer, E., “Software Vulnerabilities Already Outnumber Last Year’s,”<br />
ComputerWorld, Security, October 9, 2006.<br />
http://www.computerworld.com/action/article.do?command=viewArticleBasic&articleId<br />
=9004000&source=NLT_VVR&nlid=37<br />
30. The CERT web page as it existed on January 18, 2006.<br />
http://www.cert.org/stats/cert_stats.html<br />
31. Dunn, J., “Ch<strong>in</strong>a Attacks U.K. Government Us<strong>in</strong>g W<strong>in</strong>dows Security Hole,”<br />
ComputerWorld (on-l<strong>in</strong>e version), January 25, 2006.<br />
http://www.computerworld.com/securitytopics/security/holes/story/0,10801,108037,00.ht<br />
ml?source=NLT_VVR&nid=108037<br />
150