References


[1] Tanenbaum, A. S., Computer Networks , 3d ed., Englewood Cliffs, NJ: Prentice Hall, 1998.

[2] Comer, D. E., and R. E. Droms, Computer Networks and Internets , 2nd ed., Englewood Cliffs, NJ: Prentice Hall, 1998.

[3] Wilder, F., A Guide to the TCP/IP Protocol Suite , Second Edition , Norwood, MA: Artech House, 1998.

[4] Comer, D., Internetworking with TCP/IP: Vol. I: Principles, Protocols, and Architecture , 4th ed., Englewood Cliffs, NJ: Prentice Hall, 2000.

[5] Oppliger, R., Internet and Intranet Security , Second Edition , Norwood, MA: Artech House, 2002.

[6] Zakon, R. H., ˜ ˜Hobbes Internet Timeline, Request for Comments 2235, (FYI 32), November 1997.

[7] Spafford, E. H., The Internet Worm: Crisis and Aftermath, Communications of the ACM , Vol. 32, 1989, pp. 678 “688.

[8] Rochlis, J. A., and M. W. Eichin, ˜ ˜With Microscope and Tweezers: The Worm from MIT s Perspective, Communications of the ACM , Vol. 32, 1989, pp. 689 “703.

[9] Denning, P. J., Computers Under Attack: Intruders, Worms, and Viruses , New York: ACM Press/Addison-Wesley, 1990.

[10] Neumann, P. G., Computer-Related Risks , New York: ACM Press/Addison-Wesley, 1995.

[11] Howard, J. D., ˜ ˜ An Analysis of Security Incidents on the Internet 1989 “1995, Ph.D. Thesis, Carnegie Mellon University, April 1997.

[12] Shimomura, T., with J. Markoff, Takedown , New York: Hyperion, 1996.

[13] Schuba, C. L., et al., ˜ ˜Analysis of a Denial of Service Attack on TCP, Proceedings of IEEE Symposium on Security and Privacy , 1997, pp. 208 “223.

[14] Morris, R. T., ˜ ˜A Weakness in the 4.2BSD UNIX TCP/IP Software, Computer Science Technical Report No. 117, Murray Hill, NJ: AT&T Bell Laboratories, 1985.

[15] Bellovin, S. M., ˜ ˜Security Problems in the TCP/IP Protocol Suite, ACM Computer Communication Review , Vol. 19, No. 2, 1989, pp. 32 “48.

[16] Braden, R., et al., ˜ ˜Report of the IAB Workshop on Security in the Internet Architecture (February 8 “10, 1994), Request for Comments 1636, June 1994.

[17] Bellovin, S., ˜ ˜Report of the IAB Security Architecture Workshop, Request for Comments 2316, April 1998.

[18] Thomas, S., HTTP Essentials: Protocols for Secure, Scaleable Web Sites , New York: John Wiley & Sons, 2001.

[19] Berners-Lee, T., R. Fielding, and H. Frystyk, ˜ ˜Hypertext Transfer Protocol ” HTTP/1.0, Request for Comments 1945, May 1996.

[20] Fielding, R., et al., ˜ ˜Hypertext Transfer Protocol ”HTTP/1.1, Request for Comments 2616, June 1999.

[21] Nielsen, H., P. Leach, and S. Lawrence, ˜ ˜An HTTP Extension Framework, Request for Comments 2774, February 2000.

[22] Oellermann, W. L., Jr., Architecting Web Services , Berkeley, CA: Apress, 2001.

[23] Graham, S., et al., Building Web Services with Java: Making Sense of XML, SOAP, WSDL and UDDI , Indianapolis, IN: Sams, 2001.

[24] U.S. Department of Defense, Trusted Computer System Evaluation Criteria , Standard DoD 5200.28-STD, Fort George G. Meade, MD, 1985.

[25] Commission of the European Communities, Information Technology Security Evaluation Criteria , Version 1.2, Directorate General XIII, 1991.

[26] U.S. Department of Defense, Trusted Network Interpretation of the Trusted Computer System Evaluation Criteria , Fort George G. Meade, MD, 1987.

[27] ISO/IEC 7498-2, Information Processing Systems ”Open Systems Interconnection Reference Model ”Part 2: Security Architecture, 1989.

[28] ITU X.800, Security Architecture for Open Systems Interconnection for CCITT Applications, 1991.

[29] Baker, R. H., Computer Security Handbook , New York: McGraw-Hill, 1991.

[30] Baker, R. H., Network Security: How To Plan for It and Achieve It , New York: McGraw-Hill, 1995.




Security Technologies for the World Wide Web
Security Technologies for the World Wide Web, Second Edition
ISBN: 1580533485
EAN: 2147483647
Year: 2003
Pages: 142
Authors: Rolf Oppliger

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net