13.07.2015 Views

SEGURIDAD EN UNIX Y REDES

SEGURIDAD EN UNIX Y REDES

SEGURIDAD EN UNIX Y REDES

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

BIBLIOGRAFÍA 331[Fri95] Æleen Frisch. Essential System Administration. O´Reilly & Associates, 1995.[G + 93] Virgil D. Gligor et al. A Guide to understanding Covert Channel Analysis of TrustedSystems. Technical Report NCSC-TG-030, National Computer Security Center,Noviembre 1993.[Gal96a][Gal96b]Miguel Ángel Gallardo. Informatoscopia y tecnología forense. In Ámbito Jurídico delas Tecnologías de la Información. Consejo General del Poder Judicial, 1996.Miguel Ángel Gallardo. Seguridad (e inseguridad) en Java. Seguridad en Informáticay Comunicaciones, (20), Junio 1996.[Gal96c] Peter Galvin. Controlling ACLs. SunWolrd, Agosto 1996.[Gar95] Simson Garfinkel. PGP: Pretty Good Privacy. O’Reilly & Associates, Enero 1995.[GC94]Berny Goodheart and James Cox. The Magic Garden Explained: The Internals of UnixSystem V Release 4, an Open Systems Design. Prentice Hall, 1994.[GKK97] Eric Guerrino, Mike Kahn, and Ellen Kapito. User authentication and encryptionoverview, 1997.[Gon97] Marcus Goncalves. Firewalls Complete. McGrawHill, 1997.[Gon99] Marcus Goncalves. Check Point Firewall–1 Administration Guide. McGrawHill, 1999.[GS96][GS97][GSTY96][Gun96][GUQ92][Gut96][Hal94]Simson Garfinkel and Eugene H. Spafford. Practical Unix & Internet Security. O’Reilly& Associates, 2nd edition, Abril 1996.Simson Garfinkel and Eugene H. Spafford. Web Security & Commerce. O’Reilly &Associates, 1st edition, Junio 1997.H. Gobioff, S. Smith, J.D. Tygar, and B. Yee. Smart cards in hostile environments.In Proceedings of the 2nd usenix Workshop on Electronic Commerce. The usenixAssociation, Noviembre 1996.Shishir Gundavaram. CGI Programming on the World Wide Web. O’Reilly & Associates,1st edition, Marzo 1996.Louis Claude Guillou, Michel Ugon, and Jean-Jacques Quisquater. The smart card – astandardized security device dedicated to public cryptology. In Contemporary Cryptology– The Science of Information Integrity, pages 561–614. IEEE Press, 1992.Peter Gutmann. Secure deletion of data from magnetic and solid-state memory. InSixth US<strong>EN</strong>IX Security Symposium Proceedings. The usenix Association, Julio 1996.Neil Haller. The s/key one time password system. In Proceedings of the isoc Symposiumon network and distributed systems security, Febrero 1994.[HC83] Richard C. Hollinger and John P. Clark. Theft by Employees. Lexington Books, 1983.[Hig88] H.J. Highland. Electromagnetic Eavesdropping Machines for Christmas? Computersand Security, 7(4), 1988.[HJAW88]Matthew S. Hecht, Abhai Johri, Radhakrishna Aditham, and T. John Wei. Experienceadding C2 Security Features to Unix. In usenix Conference Proceedings, pages 133–146. The usenix Association, Verano 1988.[Hu91] W. M. Hu. Reducing timing channels with fuzzy time. In Proceedings of the 1991Symposium on Research in Security and Privacy, pages 8–20. ieee Computer Society,Mayo 1991.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!