13.07.2015 Views

SEGURIDAD EN UNIX Y REDES

SEGURIDAD EN UNIX Y REDES

SEGURIDAD EN UNIX Y REDES

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

336 BIBLIOGRAFÍA[Rit86] Dennis M. Ritchie. On the security of <strong>UNIX</strong>. In <strong>UNIX</strong> System Manager’s Manual, 4.3BSD, Virtual VAX-11 Version, pages 17:1–3. University of California, Berkeley, CA,Abril 1986.[Riv90] Ron Rivest. The md4 message digest algorithm. In Crypto´90 Abstracts, pages 281–291,Agosto 1990.[Riv92] Ron Rivest. The md5 message digest algorithm, Abril 1992. Internet Request forComments 1321.[Rob94]Andrew T. Robinson. Internet Firewalls: An Introduction. Technical report, NetMAI-NE, P.O. BOX 8258, Portland, ME 04104-8258, USA, 1994.[Rou96] Route. Project Loki: icmp Tunnelling. Phrack Magazine, 7(49), Noviembre 1996.[Row96] Craig H. Rowland. Covert Channels in the tcp/ip Protocol Suite, 1996.[Roy88]Mike Royko. Here´s how to stop computer vandals. The Chicago Tribune, 7 Noviembre1988.[Rus99] Paul Russell. Linux ipchains HOWTO, v. 1.0.7.http://www.rustcorp.com/linux/ipchains/, 1999.[RW84]James A. Reeds and Peter J. Weinberger. File security and the <strong>UNIX</strong> system cryptcommand. AT&T Bell Labs Technical Journal, 63(8):1673–1683, Octubre 1984.[Sal90] A. Salomaa. Public Key Cryptography. Springer-Verlag, 1990.[SBL90] Corey Sandler, Tom Badgett, and Larry Lefkowitz. VAX Security: Protecting theSystem and the Data. John Wiley and Sons, 1990.[Sch94] Bruce Schneier. Applied Cryptography: Protocols, Algorithms and Source Code in C.John Wiley & Sons, 1994.[Sch97] John Schimmel. A historical look at firewall technologies. ;login:, 22(1), Febrero 1997.[See89]Donn Seeley. A tour of the Worm. In Proceedings of 1989 Winter usenix Conference.usenix Association, Febrero 1989.[Sei99] Kurt Seifried. Linux Administrator´s Security Guide.http://www.securityportal.com/lasg/, 1999.[Sem96] Chuck Semeria. Internet Firewalls and Security. Technical report, 3Com, 1996.[Ser91]Omri Serlin. SVR4 may become the first truly secure Unix. unixworld, VIII(11):39–40, Noviembre 1991.[SH82] John F. Shoch and Jon A. Hupp. The worm programs – early experience with adistributed computation. Communications of the ACM, 25(3):172–180, Marzo 1982.[SH95] Karanjit Siyan and Chris Hare. Internet y seguridad en redes. Prentice Hall, 1995.[Sha49]C. E. Shannon. Communication theory of secrecy systems. Bell Systems TechnologyJournal, 28:657–715, 1949.[Sho00] Adam Shostack. Security code review guidelines, 2000.[Sim90]Steve Simmons. Life without root. In Proceedings of the 4th Systems AdministrationConference – LISA´90. The usenix Association, Octubre 1990.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!