13.09.2014 Views

Local Area Networks (LANs) in Aircraft - FTP Directory Listing - FAA

Local Area Networks (LANs) in Aircraft - FTP Directory Listing - FAA

Local Area Networks (LANs) in Aircraft - FTP Directory Listing - FAA

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

32. Loscocco, P., Smalley, S., Muckelbauer, P., Taylor, R., Turner, S., and Farrell, J., “The<br />

Inevitability of Failure: The Flawed Assumption of Security <strong>in</strong> Modern Comput<strong>in</strong>g<br />

Environments,” Proceed<strong>in</strong>gs of the 31 st National Information Systems Security<br />

Conference, October, 1998, pp. 303-314.<br />

http://www.nsa.gov/sel<strong>in</strong>ux/papers/<strong>in</strong>evit-abs.cfm<br />

33. Skoudis, E., Counter Hack, Prentice Hall, 2002.<br />

34. Klev<strong>in</strong>sky ,T.J., Laliberte, S., and Gupta, A., Hack I.T., Addison-Wesley, 2002.<br />

35. Hatch, B. and Lee, J., Hack<strong>in</strong>g L<strong>in</strong>ux Exposed, Second Edition, McGraw-Hill/Osborne,<br />

2003.<br />

36. Mourani, G., Secur<strong>in</strong>g and Optimiz<strong>in</strong>g L<strong>in</strong>ux, The Hack<strong>in</strong>g Solution, Third Edition, Open<br />

Network Architecture, Inc., 2002.<br />

37. McClure, S., Scambray, J., and Kurtz, G., Hack<strong>in</strong>g Exposed: Network Security Secrets<br />

and Solutions, Osborne/McGraw-Hill, 1999.<br />

38. Rub<strong>in</strong>, A., White-Hat Security Arsenal: Tackl<strong>in</strong>g the Threats, Addison-Wesley, 2001.<br />

39. Barrett, D., Silverman, R., and Byrnes, R., L<strong>in</strong>ux Security Cookbook, O’Reilly and<br />

Associates, 2003.<br />

40. Devanbu, P. and Stubbleb<strong>in</strong>e, S., “Software Eng<strong>in</strong>eer<strong>in</strong>g for Security: a Roadmap,”<br />

ICSE 2000. http://www.stubbleb<strong>in</strong>e.com/00icse.pdf<br />

41. Abrams, M., “<strong>FAA</strong> System Security Test<strong>in</strong>g and Evaluation,” The MITRE Corporation,<br />

MTR 02W0000059, May 2003.<br />

42. DoD 5200.28-STD, “Department of Defense Trusted Computer System Evaluation<br />

Criteria,” (TCSEC), December 26, 1985.<br />

http://www.radium.ncsc.mil/tpep/library/ra<strong>in</strong>bow/5200.28-STD.html<br />

43. U.S. National Computer Security Center, “Trusted Network Interpretation of the Trusted<br />

Computer System Evaluation Criteria,” NCSC-TG-005, Version 1, U.S. Department of<br />

Defense, Ft. Meade, MD, 31 July 1987.<br />

44. Common Criteria for Information Technology Security Evaluation, Part 1, Version 2.1,<br />

CCIMB-99-031, August 1999.<br />

45. Common Criteria for Information Technology Security Evaluation, Part 2, Version 2.1,<br />

CCIMB-99-032, August 1999.<br />

151

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!