13.07.2015 Views

SEGURIDAD EN UNIX Y REDES

SEGURIDAD EN UNIX Y REDES

SEGURIDAD EN UNIX Y REDES

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Bibliografía[Age85]National Security Agency. Magnetic Tape Degausser. Technical Report L14-4-A, NationalSecurity Agency/Central Security Service, Octubre 1985.[AK96] Ross J. Anderson and Markus Kuhn. Tamper resistance – a cautionary note. InProceedings of the 2nd usenix Workshop on Electronic Commerce, pages 1–11. Theusenix Association, Noviembre 1996.[AKS96][ALGJ98]Taimur Aslam, Ivan Krsul, and Eugene H. Spafford. Use of a taxonomy of securityfaults. Technical Report TR-96-051, Purdue University Department of Computer Science,1996.Stefan Axelsson, Ulf Lindqvist, Ulf Gustafson, and Erland Jonsson. An approach toUnix Security Logging. In Proceedings of the 21st National Information Systems SecurityConference, pages 62–75. National Institute of Standards and Technology/NationalComputer Security Center, Octubre 1998.[And94] Ross J. Anderson. Why Cryptosystems Fail. Communications of the ACM, 37:32–40,Noviembre 1994.[And97] Ross J. Anderson. Tamperproofing of Chip Cards. Enviado a la listacypherpunks@cyberpass.net por William H. Geiger III en septiembre, 1997.[Ano97][ANS98]Anonymous. Maximum Security: a hacker´s guide to protecting your Internet site andnetwork. McMillan Computer Publishing, 1997.R. J. Anderson, R. M. Needham, and A. Shamir. The Steganographic File System.Lecture Notes in Computer Science, 1525:73–82, 1998.[Atk93] Derek A. Atkins. Charon: Kerberos Extensions for Authentication over SecondaryNetworks. PhD thesis, Department of Electrical Engineering and Computer Science,Massachusetts Institute of Technology, 1993.[B + 85] Sheila L. Brand et al. Department of Defense Trusted Computer System EvaluationCriteria. Technical Report DOD 5200.28-STD, Department of Defense, Diciembre 1985.[B + 88] Sue Berg et al. Glossary of Computer Security Terms. Technical Report NCSC-TG-004,National Computer Security Center, Octubre 1988.[Bac86] Maurice J. Bach. The Design of the Unix Operating System. Prentice Hall, 1986.[BAW96][BBD + 96]F. Bouchier, J.S. Ahrens, and G. Wells. Laboratory evaluation of the IriScan prototypebiometric identifier. Technical Report SAND96-1033, Sandia National Laboratories,Abril 1996.Michael Beck, Harold Bohme, Mirko Dzladzka, Ulrich Kunitz, Robert Magnus, andDirk Verworner. Linux Kernel Internals. Addison-Wesley, 1996.327

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!