13.09.2014 Views

Local Area Networks (LANs) in Aircraft - FTP Directory Listing - FAA

Local Area Networks (LANs) in Aircraft - FTP Directory Listing - FAA

Local Area Networks (LANs) in Aircraft - FTP Directory Listing - FAA

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

A.5 REFERENCES.<br />

A-1.<br />

Loscocco, P., Smalley, S., Muckelbauer, P., Taylor, R., Turner, S., and Farrell, J., “The<br />

Inevitability of Failure: The Flawed Assumption of Security <strong>in</strong> Modern Comput<strong>in</strong>g<br />

Environments,” Proceed<strong>in</strong>gs of the 31 st National Information Systems Security<br />

Conference, October, 1998, pp. 303-314.<br />

http://www.nsa.gov/sel<strong>in</strong>ux/papers/<strong>in</strong>evit-abs.cfm<br />

A-2. Skoudis, E., Counter Hack, Prentice Hall, 2002.<br />

A-3. Klev<strong>in</strong>sky ,T.J., Laliberte, S., and Gupta, A., Hack I.T., Addison-Wesley, 2002.<br />

A-4.<br />

A-5.<br />

A-6.<br />

Hatch, B. and Lee, J., Hack<strong>in</strong>g L<strong>in</strong>ux Exposed, Second Edition, McGraw-Hill/Osborne,<br />

2003.<br />

Mourani, G., Secur<strong>in</strong>g and Optimiz<strong>in</strong>g L<strong>in</strong>ux, The Hack<strong>in</strong>g Solution, Third Edition, Open<br />

Network Architecture, Inc., 2001.<br />

McClure, S., Scambray, J., and Kurtz, G., Hack<strong>in</strong>g Exposed: Network Security Secrets<br />

and Solutions, Osborne/McGraw-Hill, 1999.<br />

A-7. Rub<strong>in</strong>, A., White-Hat Security Arsenal: Tackl<strong>in</strong>g the Threats, Addison-Wesley, 2001.<br />

A-8. Barrett, D., Silverman, R., and Byrnes, R., L<strong>in</strong>ux Security Cookbook, O’Reilly and<br />

Associates, 2003.<br />

A-9. Hatch, B. and Lee, J., Hack<strong>in</strong>g L<strong>in</strong>ux Exposed, Second Edition, Osborne Press, 2003.<br />

A-10. Toxen, B., Real World L<strong>in</strong>ux Security, Second Edition, Prentice Hall, 2003, pp. 29.<br />

A-11. DoD 8551.1, Department of Defense Instruction Number 8551.1, “Ports, Protocols, and<br />

Services Management (PPSM),” August 13, 2004.<br />

A-12. Devanbu, P., Fong, P., and Stubbleb<strong>in</strong>e, S., “Techniques for Trusted Software<br />

Eng<strong>in</strong>eer<strong>in</strong>g,” Proceed<strong>in</strong>gs of the 20 th International Conference on Software<br />

Eng<strong>in</strong>eer<strong>in</strong>g, Kyoto, Japan, 1998.<br />

A-13. McGraw, G. and Felten, E., “Mobile Code and Security,” IEEE Internet Comput<strong>in</strong>g,<br />

Volume 2, Number 6, November/December 1998, pp. 26-29.<br />

A-14. Kay, R., “QuickStudy: Rootkits,” ComputerWorld Magaz<strong>in</strong>e (electronic version),<br />

January 30, 2006.<br />

http://www.computerworld.com/securitytopics/security/hack<strong>in</strong>g/story/0,10801,108119,00<br />

.html?source=NLT_SEC&nid=108119<br />

A-19

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!