Appendix A. References

Chapter 1

100th Congress. Computer Security Act of 1987. Public Law 100-235. www.epic.org/crypto/csa/csa.html (accessed June 2004).

CERT. Denial of Service Attacks. www.cert.org/tech_tips/denial_of_service.html (accessed August 2003).

CNN/Technology. Hacker Accesses 5.6 Million Credit Cards. February 18, 2003. www.cnn.com/2003/TECH/02/17/creditcard.hack/index.html (accessed 15 December 2004).

Computer Security Institute. Cyber Crime Bleeds U.S. Corporations, Survey Shows; Financial Losses from Attacks Climb for Third Year in a Row. April 7, 2002. www.gocsi.com/press/20020407.jhtml; jsessionid=J5CTJV4ZKSD3MQSNDBGCKHSCJUMEKJVN?_requestid=219439 (accessed 15 December 2004).

DefCon II. Wardriving Statistics. Las Vegas, NV. August 2003. www.defcon.org/html/defcon-11/defcon-11-postcon.html (accessed 15 December 2004).

F-Secure. F-Secure Virus Descriptions. 2003. www.f-secure.com/v-descs/_new.shtml (accessed 15 December 2004).

Glossary of Hacker Terminology. June 2004. www.cs.usask.ca/undergrads/kwm519/490/project/details/glossary.htm (accessed 15 December 2004).

Hacker Dictionary. April 2003. www.hacker-dictionary.com/.

Landesman, Mary. What Is a Virus? http://antivirus.about.com/cs/tutorials/a/whatisavirus.htm (accessed November 2004).

Lemos, Robert. “Mitnick Teaches Social Engineering.” ZDNet News. July 16, 2000. http://zdnet.com.com/2100-11-522261.html?legacy=zdnn (accessed 15 December 2004).

Poulsen, Kevin. “War Driving by the Bay.” SecurityFocus. April 12, 2001. www.securityfocus.com/news/192 (accessed 15 December 2004).

Raymond, Eric S. 2003. The New Hacker’s Dictionary. 3rd ed. Cambridge, MA: The MIT Press.

Chapter 2

Delio, Michelle. “MyDoom Targets Linux Antagonist.” Wired News. January 27, 2004. www.wired.com/news/linux/0,1411,62058,00.html (accessed 15 December 2004).

F-Secure. F-Secure Virus Descriptions: Sobig. April 23, 2003. www.f-secure.com/v-descs/sobig.shtml (accessed 15 December 2004).

Gibson, Steve. “Description and Analysis of a Potent, Increasingly Prevalent, and Worrisome Internet Attack.” Distributed Reflection Denial of Service. http://grc.com/dos/drdos.htm (accessed 15 December 2004).

Gudmundsson, Atli, and Scott Gettis. [email protected]. July 28, 2003. http://securityresponse.symantec.com/avcenter/venc/data/[email protected] (accessed 15 December 2004).

Huegen, Craig. “The Latest in Denial of Service Attacks: Smurfing.” www.governmentsecurity.org/articles/THELATESTINDENIALOFSERVICEATTACKSSMURFING.php (accessed November 2004).

Hypponen, Mikko; Tocheva, Katrin; Rautiainen Sami. “MyDoom Virus Description.” www.f-secure.com/v-descs/novarg.shtml (accessed November 2004).

Kapersky Lab. “The Virus List Web Site, Zafi Worm.” www.viruslist.com/en/viruslist.html?id=1666973 (accessed December 2004).

Moore, David; Paxson, Vern; Savage, Stefan; Shannon, Colleen; Staniford, Weaver; Stuart, Nicholas. “Inside the Slammer Worm.” http://csdl.computer.org/comp/mags/sp/2003/04/j4033abs.htm (accessed August 2004).

Rooney, Paul. “Gates Says SCO’s Case Against IBM Will Harm Linux’s Commercial Prospects.” www.crn.com/sections/breakingnews/dailyarchives.jhtml;jsessionid=NHYCTYPFXMPGGQSNDBCSKHSCJUMEKJVN?articleId=18839636&_requestid=1042690 (accessed 25 July 2003).

SCO/Linux. 2003. swpat.ffii.org/patente/wirkungen/sco/index.en.html (accessed 15 December 2004).

Tanase, Matthew. “IP Spoofing: An Introduction.” March 11, 2003. www.securityfocus.com/infocus/1674 (accessed 1 November 2004).

Vmyths.com. “jdbgmgr.exe Virus.” July 7, 2002. www.vmyths.com/hoax.cfm?id=275&page=3 (accessed 16 December 2004).

Webopedia. “Buffer Overflow Attack.” 2004. www.webopedia.com/TERM/b/buffer_overflow.html (accessed 14 November 2004).

Webopedia. “Denial of Service Attack. “2004. www.webopedia.com/TERM/D/DoS_attack.html (accessed 15 December 2004).

Chapter 4

Canavan, John, and Rodney Andres. “MyDoom Virus Alert.” July 20, 2004. http://securityresponse.symantec.com/avcenter/venc/data/[email protected] (accessed 20 July 2004).

Check Point Firewall-1 Data Sheet. www.checkpoint.com/products/downloads/firewall-1_datasheet.pdf (accessed October 2004).

D-Link. Product Data Sheet. ftp://ftp10.dlink.com/pdfs/products/DFL-300/DFL-300_ds.pdf (accessed October 2004).

SonicWALL Data Sheet. www.firewalls.com/sonicwall-tz-170-10.asp (accessed October 2004).

Chapter 6

Burnett, Steve and Stephen Paine. 2001. RSA Security’s Official Guide to Cryptography. New York, NY: McGraw-Hill.

Curtin, Matt. “Snake Oil Warning Signs: Encryption Software to Avoid.” April 10, 1998. www.interhack.net/people/cmcurtin/snake-oil-faq.html (accessed 16 December 2004).

Federal Information Processing Standards. Data Encryption Standards (DES). Publication 46-2. December 30, 1993. www.itl.nist.gov/fipspubs/fip46-2.htm (accessed 16 December 2004).

Hershey, J. E. 2003. Cryptography Demystified. New York, NY: McGraw-Hill.

International PGP. Home Page. www.pgpi.org/ (accessed March 2004).

McCune, Tom. “Tom McCune’s Page for Pretty Good Privacy.” www.mccune.cc/PGP.htm (accessed March 2004).

MyCrypto.Net. “Encryption Algorithms.” www.mycrypto.net/encryption/crypto_algorithms.html (accessed April 2004).

Security in Computing. “Letter Frequency Distributions in the English Alphabet.” 1988. arapaho.nsuok.edu/~rosener/mis4313/freq-distribution.html (accessed 16 December 2004).

Zimmerman, Philip. “Philip Zimmerman: Creator of PGP.” www.philzimmermann.com/EN/background/index.html (accessed March 2004).

Chapter 7

Salamone, Salvatore. “Does Everybody Really Know What a VPN Is?” Internet Week. December 14, 1998. www.internetweek.com/VPN/paper-2.htm (accessed 19 August 2004).

Chapter 9

F-Secure. F-Secure Virus Descriptions: Sobig. April 23, 2003. www.f-secure.com/v-descs/sobig.shtml (accessed 15 December 2004).

F-Secure. F-Secure Virus Descriptions: Mabutu. July 29, 2004. www.f-secure.com/v-descs/mabutu.shtml (accessed 15 December 2004).

Kaspersky Labs. “Zafi Worm.” July 2004. www.kaspersky.com/removaltools (accessed 13 October 2004).

McAfee Virus Hoax Listings. us.mcafee.com/virusInfo/default.asp?id=description&virus_k=100151 (accessed December 2004).

Vmyths.com. “jdbgmgr.exe Virus.” July 7, 2002. www.vmyths.com/hoax.cfm?id=275&page=3 (accessed 16 December 2004).

Chapter 10

Roberts, Paul. “Trojan Horse Hijacks IE: Attack Sends Browsers Aiming for Search Engines to Hackers’ Site Instead.” PC World. October 2, 3003. www.pcworld.com/news/article/0,aid,112732,tfg,tfg,00.asp (accessed 05 July 2004).

Chapter 14

BBC News. “Russians Arrest ‘CIA Hacker.’” June 26, 2000. http://news.bbc.co.uk/1/hi/world/europe/806984.stm (accessed 17 December 2004).

Denning, Dorothy E. “Cyberterrorism.” May 23, 2000. www.cosc.georgetown.edu/~denning/infosec/cyberterror.html (accessed 17 December 2004).

Gray, Alfred. www.securityfocus.com/archive/12/75718 (accessed 03 June 2004).

Savino, Adam. “Cyber-Terrorism.” www.cybercrimes.net/Terrorism/ct.html (accessed 01 November 2004).

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.135.196.172