14.10 References

 <  Day Day Up  >  

  • Windows .NET Server Security Handbook , by Cyrus Peikari and Seth Fogie. Prentice Hall, 2002.

  • "Hacking .NET Server," by Cyrus Peikari and Seth Fogie. Paper presented at Defcon 10, August 2002. (http://www.airscanner.com)

  • "Waking the Sleeping Giant: Is Windows .NET Server Secure?" by Cyrus Peikari. Secure Computing Magazine , June 2002.

  • "Is .NET Server Really `Trustworthy'?" by Zubair Alexander. InformIT.co , May 2002.

  • "Feasibility of Attacking Windows 2000 Kerberos Passwords." Excerpt reprinted with permission from Frank O'Dwyer.

  • "Active Directory Stack Overflow," by Eduardo Arias, Gabriel Becedillas, Ricardo Quesada, and Damian Saura. Core Security Technologies Advisory, July 2003. (http://www.coresecurity.com/common/showdoc.php?idx=351&idxseccion=10)

  • "PKI: Breaking the Yellow Lock," by Richard Forno. SecurityFocus , February 2002.

  • "50 Ways to Defeat PKI," by Fred Cohen. (http://www.all.net)

  • "Erroneous VeriSign-Issued Digital Certificates Pose Spoofing Hazard." Microsoft Security Bulletin MS01-017, March 2001.

  • "Tamperproofing of Chip Card," by Ross J. Anderson. Cambridge University Computer Laboratory.

  • "Pirates Cash In on Weak Chips," by James Glave. Wired News , May 1998

  • "Tamper Resistance ”A Cautionary Note," by Ross Anderson and Markus Kuhn. Cambridge University Computer Laboratory.

 <  Day Day Up  >  


Security Warrior
Security Warrior
ISBN: 0596005458
EAN: 2147483647
Year: 2004
Pages: 211

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net