13.07.2015 Views

SEGURIDAD EN UNIX Y REDES

SEGURIDAD EN UNIX Y REDES

SEGURIDAD EN UNIX Y REDES

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

BIBLIOGRAFÍA 335[Par94][Par98][PB93]Donn B. Parker. Demonstrating the elements of information security with threats. InProceedings of the 17th National Computer Security Conference, pages 421–430, 1994.William Parkhurst. Cisco Router OSPF Design and Implementation Guide. McGraw-Hill, 1998.W. Timothy Polk and Lawrence E. Bassham. Security issues in the Database LanguageSQL, Julio 1993.[Pfl97] Charles P. Pfleeger. Security in computing. Prentice Hall, 1997.[Phi97] Ken Phillips. Biometric identification comparison chart. PC Week, Marzo 1997.[Pit00][PK91]Jesús Pita. La tarjeta inteligente como medio de identificación electrónica y acceso aservicios de seguridad: la experiencia de la fnmt-rcm. Seguridad en Informática yComunicaciones, (39), Abril 2000.P.A. Porras and R.A. Kemmerer. Analyzing covert storage channels. In Proceedings ofthe 1991 Symposium on Research in Security and Privacy, pages 36–51. ieee ComputerSociety, Mayo 1991.[Pla83] José Plans. La pratique de l´audit informatique. Eyrolles, 1983.[Pla99] Plasmoid. Attacking Solaris with loadable kernel modules.http://www.infowar.co.uk/thc/, 1999.[PN92]Norman E. Proctor and Peter G. Neumann. Architectural implications of Covert Channels.In Proceedings of the 15th National Computer Security Conference, pages 28–43,Octubre 1992.[PPK93] Pinkas, Parker, and Kaijser. SESAME: An Introduction, 1993.[Pra99a][Pra99b][RA94]Pragmatic. Attacking FreeBSD with Kernel Modules. http://www.infowar.co.uk/thc/,Junio 1999.Pragmatic. Complete Linux Loadable Kernel Modules. http://www.infowar.co.uk/thc/,Marzo 1999.Marcus J. Ranum and Frederick M. Avolio. A toolkit and methods for internet firewalls.In Proceedings of the Technical Summer Conference, pages 37–44. The usenixAssociation, Junio 1994.[Rad92] Peter V. Radatti. Computer virus awareness for <strong>UNIX</strong>. NCSA News, 3:8, Mayo 1992.[Rad93][Rad95]Peter V. Radatti. The plausibility of <strong>UNIX</strong> virus attacks. Technical report, Cybersoft,Inc., 1993.Peter V. Radatti. Computer viruses in Unix networks. Technical report, Cybersoft,Inc., 1995.[Rad97] Peter V. Radatti. MrMean the hacker. ;login:, Octubre 1997.[Ran93] Marcus J. Ranum. Thinking about Firewalls. In Proceedings of the Second SANSConference, Abril 1993.[Ran95] Marcus J. Ranum. Firewalls Frequently Asked Questions, 1995.[RCG96][Rei89]A. Ribagorda, A. Calvo, and M.A. Gallardo. Seguridad en Unix: Sistemas Abiertos eInternet. Paraninfo, 1996.N. Reichman. Breaking confidences: Organizational influences on insider trading. TheSociological Quarterly, 30:185–204, 1989.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!