Local Area Networks (LANs) in Aircraft - FTP Directory Listing - FAA
Local Area Networks (LANs) in Aircraft - FTP Directory Listing - FAA
Local Area Networks (LANs) in Aircraft - FTP Directory Listing - FAA
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
A.5 REFERENCES.<br />
A-1.<br />
Loscocco, P., Smalley, S., Muckelbauer, P., Taylor, R., Turner, S., and Farrell, J., “The<br />
Inevitability of Failure: The Flawed Assumption of Security <strong>in</strong> Modern Comput<strong>in</strong>g<br />
Environments,” Proceed<strong>in</strong>gs of the 31 st National Information Systems Security<br />
Conference, October, 1998, pp. 303-314.<br />
http://www.nsa.gov/sel<strong>in</strong>ux/papers/<strong>in</strong>evit-abs.cfm<br />
A-2. Skoudis, E., Counter Hack, Prentice Hall, 2002.<br />
A-3. Klev<strong>in</strong>sky ,T.J., Laliberte, S., and Gupta, A., Hack I.T., Addison-Wesley, 2002.<br />
A-4.<br />
A-5.<br />
A-6.<br />
Hatch, B. and Lee, J., Hack<strong>in</strong>g L<strong>in</strong>ux Exposed, Second Edition, McGraw-Hill/Osborne,<br />
2003.<br />
Mourani, G., Secur<strong>in</strong>g and Optimiz<strong>in</strong>g L<strong>in</strong>ux, The Hack<strong>in</strong>g Solution, Third Edition, Open<br />
Network Architecture, Inc., 2001.<br />
McClure, S., Scambray, J., and Kurtz, G., Hack<strong>in</strong>g Exposed: Network Security Secrets<br />
and Solutions, Osborne/McGraw-Hill, 1999.<br />
A-7. Rub<strong>in</strong>, A., White-Hat Security Arsenal: Tackl<strong>in</strong>g the Threats, Addison-Wesley, 2001.<br />
A-8. Barrett, D., Silverman, R., and Byrnes, R., L<strong>in</strong>ux Security Cookbook, O’Reilly and<br />
Associates, 2003.<br />
A-9. Hatch, B. and Lee, J., Hack<strong>in</strong>g L<strong>in</strong>ux Exposed, Second Edition, Osborne Press, 2003.<br />
A-10. Toxen, B., Real World L<strong>in</strong>ux Security, Second Edition, Prentice Hall, 2003, pp. 29.<br />
A-11. DoD 8551.1, Department of Defense Instruction Number 8551.1, “Ports, Protocols, and<br />
Services Management (PPSM),” August 13, 2004.<br />
A-12. Devanbu, P., Fong, P., and Stubbleb<strong>in</strong>e, S., “Techniques for Trusted Software<br />
Eng<strong>in</strong>eer<strong>in</strong>g,” Proceed<strong>in</strong>gs of the 20 th International Conference on Software<br />
Eng<strong>in</strong>eer<strong>in</strong>g, Kyoto, Japan, 1998.<br />
A-13. McGraw, G. and Felten, E., “Mobile Code and Security,” IEEE Internet Comput<strong>in</strong>g,<br />
Volume 2, Number 6, November/December 1998, pp. 26-29.<br />
A-14. Kay, R., “QuickStudy: Rootkits,” ComputerWorld Magaz<strong>in</strong>e (electronic version),<br />
January 30, 2006.<br />
http://www.computerworld.com/securitytopics/security/hack<strong>in</strong>g/story/0,10801,108119,00<br />
.html?source=NLT_SEC&nid=108119<br />
A-19