13.07.2015 Views

SEGURIDAD EN UNIX Y REDES

SEGURIDAD EN UNIX Y REDES

SEGURIDAD EN UNIX Y REDES

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

332 BIBLIOGRAFÍA[Hun92] Craig Hunt. TCP/IP Network Administration. O´Reilly & Associates, 1992.[Huo98]Simo Huopio. Biometric Identification. In Seminar on Network Security: Authorizationand Access Control in Open Network Environment, 1998.[Ins97] Shawn Instentes. Stack Smashing: What to do? ;login:, 22(2), Abril 1997.[ISV95][JTY97][JZRT99]David Icove, Karl Seger, and William VonStorch. Computer Crime. A Crimefighter’shandbook. O’Reilly & Associates, 1995.Philippe Janson, Gene Tsudik, and Moti Yung. Scalability and flexibility in authenticationservices: The KryptoKnight Approach. In Proceedings of INFOCOM´97. ieeeComputer Society, 1997.Karen Johnson, Jeffrey B. Zurschmeide, John Raithel, and Bill Tuthill. IRIX admin:backup, security and accounting. Technical Report 007-2862-004, Silicon Graphics,Inc., 1999.[Kah67] David Kahn. The Codebreakers. McMillan, 1967.[Kat88][KI99]J. Katz. Seductions of Crime: Moral and Sensual Attractions in Doing Evil. BasicBooks, 1988.Gershon Kedem and Yuriko Ishihara. Brute force attack on Unix passwords with simdcomputer. In Proceedings of the 8th usenix Security Symposium. The usenix Association,Agosto 1999.[Kir95] Olaf Kirch. The Linux Network Administrators´ Guide. O´Reilly & Associates, 1995.[KK92]David Koblas and Michelle Koblas. Socks. In Proceedings of the Third Unix SecuritySymposium, pages 77–83. The usenix Association, Septiembre 1992.[Kle90] Daniel V. Klein. Foiling the cracker: A survey of, and improvements to, passwordsecurity. In Unix Security Workshop, pages 5–14. The usenix Association, Agosto1990.[KMM95][KP84][KS93]R. Kohno, R. Meidan, and L.B. Milstein. Spread Spectrum Access Methods for WirelessCommunications. IEEE Communications Magazine, 33:58–67, Enero 1995.Brian W. Kernighan and Rob Pike. The Unix Programming Environment. PrenticeHall, 1984.Gene H. Kim and Eugene H. Spafford. The design and implementation of Tripwire:A file system integrity checker. Technical Report CSD-TR-93-071, Purdue University,Noviembre 1993.[KS94a] Gene H. Kim and Eugene H. Spafford. Experiences with Tripwire: using integritycheckers for intrusion detection. In Systems Administration, Networking and SecurityConference III. The usenix Association, Abril 1994.[KS94b][KT97][Lam73]Gene H. Kim and Eugene H. Spafford. Writing, supporting and evaluating Tripwire: apublically available security tool. In Proceedings of the usenix Applications DevelopmentSymposium. The usenix Association, 1994.Micki Krause and Harold F. Tipton. Handbook of Information Security Management.CRC Press LLC, 1997.B. W. Lampson. A note on the Confinement Problem. Communications of the ACM,16(10):613–615, Octubre 1973.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!