13.07.2015 Views

SEGURIDAD EN UNIX Y REDES

SEGURIDAD EN UNIX Y REDES

SEGURIDAD EN UNIX Y REDES

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

338 BIBLIOGRAFÍA[vE85][Ven92]Wim van Eck. Electromagnetic Radiation from Video Display Units: An EavesdroppingRisk? Computers and Security, 4(4), 1985.Wietse Venema. TCP Wrapper: Network monitoring, access control and booby traps.In Proceedings of the 3rd usenix Unix Security Symposium, pages 85–92. The usenixAssociation, Septiembre 1992.[Vic94] Bob Vickers. Guide to safe X, Febrero 1994.[vKPG97][vSS98][vSTO94][WC94][WD95][Wra91a][Wra91b][Wre98][Ylo96]Robert van Kralingen, Corien Prins, and Jan Grijpink. Using your body as a key: legalaspects of biometrics, 1997.Carl van Schaik and Paul Smeddle. A Steganographic File System Implementation forLinux. Technical report, University of Cape Town (South Africa), Octubre 1998.R. G. van Schyndel, A. Z. Tirkel, and C. F. Osborne. A digital watermark. In InternationalConference on Image Processing, volume 2, pages 86–90. IEEE, 1994.John P. Wack and Lisa J. Carnahan. Keeping your site comfortably secure: an introductionto Internet Firewalls. Technical report, National Institute of Standards andTechnology (nist), Diciembre 1994. Special Publication 800-10.Ira S. Winkler and Brian Dealy. Information security technology?...Don´t rely on it.A case study in social engineering. In Proceedings of the 5th usenix Unix SecuritySymposium. The usenix Association, Junio 1995.J.C. Wray. An analysis of covert timing channels. In Proceedings of the 1991 Symposiumon Research in Security and Privacy, pages 2–7. ieee Computer Society, Mayo 1991.J.W. Wray. Toward a mathematical foundation for information flow security. In Proceedingsof the 1991 Symposium on Research in Security and Privacy, pages 21–34. ieeeComputer Society, Mayo 1991.Dave Wreski. Linux Security Administrator´s Guide. http://nic.com/˜dave/Security/,1998.Tatu Ylonen. ssh – Secure login connetions over the Internet. In Proceedings of the 6thusenix Security Symposium, pages 37–42. The usenix Association, Julio 1996.[Zim95a] Phil Zimmermann. The Official pgp User´s Guide. M.I.T. Press, 1995.[Zim95b] Phil Zimmermann. pgp: Source Code and Internals. M.I.T. Press, 1995.[Zur94]Jeffrey B. Zurschmeide. IRIX Advanced Site and Server Administration Guide. TechnicalReport 007-0603-100, Silicon Graphics, Inc., 1994.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!