13.07.2015 Views

SEGURIDAD EN UNIX Y REDES

SEGURIDAD EN UNIX Y REDES

SEGURIDAD EN UNIX Y REDES

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

BIBLIOGRAFÍA 329[Cab96] Pino Caballero. Introducción a la Criptografía. Ra-Ma, 1996.[Caj82][CB94][CC86]Valentin Sanz Caja. Vulnerabilidad y seguridad de los sistemas informáticos. FundaciónCitema, 1982.William R. Cheswick and Steven M. Bellovin. Firewalls and Internet Security: Repellingthe wily hacker. Addison Wesley, 1994.D.B. Cornish and R. V. Clarke. The Reasoning Criminal: Rational Choice Perspectiveson Offending. Springer-Verlag, 1986.[CDK94] G.F. Couloris, J. Dollimore, and T. Kindberg. Distributed Systems. Concepts anddesign. Addison Wesley, 2nd edition, 1994.[CDM97][Cen91][CER99][CES91]Rémy Card, Eric Dumas, and Frack Mével. Programación Linux 2.0: API de sistemay funcionamiento del núcleo. Eyrolles, 1997.National Computer Security Center. Data Remanence in Automated Information Systems.Technical Report NCSC-TG-025, National Computer Security Center, Septiembre1991.CERT. CERT Advisory CA–99–02. Trojan Horses. Technical report, Computer EmergencyResponse Team, Marzo 1999.CESID. Glosario de términos de Criptología. Centro Superior de Información de laDefensa, 1991.[CH99] Stephen Ciullo and Daniel Hinojosa. HP-UX kernel tuning and performance guide.http://www.hp.com/techpartners/tuning.html, 1999.[Cha92][Che92][CHN + 92][CHS91][Coh84][CoIST99][Com88][Cow92][CR94]D. Brent Chapman. Network (In)Security through ip packet filtering. In Proceedingsof the third usenix Security Symposium, pages 63–76. The usenix Association, Septiembre1992.William R. Cheswick. An evening with Berferd, in which a cracker is lured, endured,and studied. In Proceedings of the Winter usenix Conference. The usenix Association,Enero 1992.Andrew Cherry, Mark W. Henderson, William K. Nickless, Robert Olson, and GeneRackow. Pass or fail: A new test for password legitimacy, 1992.Bruce Corbridge, Robert Henig, and Charles Slater. Packet filtering in an ip router.In Proceedings of the Fifth LISA Conference, pages 227–232. The usenix Association,Octubre 1991.Fred Cohen. Computer viruses: theory and experiments. In 7th DoD/NBS ComputerSecurity Conference Proceedings, pages 240–263, Septiembre 1984.National Research Council Committee on Information Systems Trustworthiness. Trustin Cyberspace. National Academy Press, 1999.Apollo Computer. Managing SysV System Software. Technical Report 010851-A00,Apollo Computer, Inc. (Hewlett Packard), Junio 1988.Randle Cowcher. Physical Security. In Keith M. Jackson and Jan Hruska, editors, ComputerSecurity Reference Book, chapter 24, pages 311–332. Butterworth-Heinemann,1992.Kaare Christian and Susan Richter. The Unix Operating System. John Wiley & Sons,1994.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!