13.07.2015 Views

SEGURIDAD EN UNIX Y REDES

SEGURIDAD EN UNIX Y REDES

SEGURIDAD EN UNIX Y REDES

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

330 BIBLIOGRAFÍA[CWP + 00] Crispin Cowan, Perry Wagle, Calton Pu, Steve Beattie, and Jonathan Walpole. BufferOverflows: Attacks and Defenses for the Vulnerability of the Decade. In Proceedingsof the sans 2000 Conference. The sans Institute, 2000.[CZ95]D. Brent Chapman and Elizabeth D. Zwicky. Building Internet Firewalls. O´Reilly &Associates, 1st edition, Noviembre 1995.[dA88] Ana Maria de Alvaré. How crackers crack passwords, or what passwords to avoid.Technical Report UCID-21515, Lawrence Livermore National Laboratory, Septiembre1988.[Dau97] John Daugman. Iris recognition for personal identification, 1997.[Dau98]John Daugman. Recognizing persons by their iris patterns. In Biometrics: PersonalIdentification in Networked Society, pages 103–121. Kluwer, 1998.[Den83] Dorothy Denning. Cryptography and Data Security. Addison-Wesley, 1983.[Den90] P. Denning. Computers under attack. ACM Press, 1990.[DFW96][DH76]Drew Dean, Edward W. Felten, and Dan S. Wallach. Java Security: from HotJava toNetscape and beyond. In Proceedings of the IEEE Symposium on Security and Privacy,1996.W. Diffie and M. E. Hellman. New directions in cryptography. IEEE Transactions onInformation Theory, IT-22:644–654, Noviembre 1976.[DH77] W. Diffie and M.E. Hellman. Exhaustive cryptanalysis of the nbs data encryptionstandad. Computer, 10(6):74–84, Junio 1977.[Dik99][DP84][Duf89]Casper Dik. Solaris 2 FAQ, Octubre 1999. ftp://ftp.wins.uva.nl/pub/solaris/.D. W. Davies and W. L. Price. Security for Computer Networks: An Introduction toData Security in Teleprocessing and Electronic Funds Transfer. John Wiley and Sons,New York, 1984.Tom Duff. Experience with viruses on <strong>UNIX</strong> systems. In usenix Computing Systems,volume 2, 1989.[ER89] M.W. Eichin and J.A. Rochlis. With microscope and tweezers: An analysis of theInternet Virus of November 1988. In IEEE Security and Privacy, pages 326–343, 1989.[Eve92]David Everett. Identity verification and biometrics. In Keith M. Jackson and Jan Hruska,editors, Computer Security Reference Book, chapter 10, pages 37–73. Butterworth-Heinemann, 1992.[Fen99] Carole Fennelly. The human side of computer security. SunWorld, Julio 1999.[Fis95][FK90][FPA98][Fre98]John Fisher. Securing X Windows. Technical Report CIAC-2316 R.0, Department ofEnergy Computer Incident Advisory Capability – CIAC, Agosto 1995.David C. Feldmeirer and Philip R. Karn. <strong>UNIX</strong> password security - ten years later. InG. Brassard, editor, CRYPTO89, pages 44–63. Springer-Verlag, 1990. Lecture Notes inComputer Science No. 435.Dan Farmer, Brad Powell, and Matthew Archibald. Titan. In Proceedings of the 12thSystems Administration Conference – LISA´98. The usenix Association, Diciembre1998.Martin Freiss. Protecting networks with SATAN. O’Reilly & Associates, 1st edition,Mayo 1998.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!