bibliography
Page 1 of 1
bibliography
Ranum, M., Internet Firewalls: Frequently Asked Questions, Firewalls FAQ, http://www.faqs.org/faqs/firewalls-faq/, 2000/12/01.
“The Firewalls FAQ is currently undergoing revision. The maintainers welcome input and comments on the contents of this FAQ.”
“A firewall is a system or group of systems that enforces an access control policy between two networks. The actual means by which this is accomplished varies widely, but in principle, the firewall can be thought of as a pair of mechanisms: one which exists to block traffic, and the other which exists to permit traffic.”
Ingham, K., Forrest S., A History and Survey of Network Firewalls, University of New Mexico, http://www.cs.unm.edu/~treport/tr/02-12/firewall.pdf, 2001.
“The protocols used on the Internet for these layers, as well as all other Internet
standards are speci_ed by documents known as Requests for Comments (RFCs).”
“Examples of successful or attempted intrusions around the same time include:
Cliord Stoll's discovery of German spies tampering with his system [Stoll 1988;
1989], and Bill Cheswick's \Evening with Berferd" [1992] in which he set up a simple
Electronic \jail" for an attacker. In this jail, the attacker was unable to a_ect
the real system but was left with the impression that he or she had successfully
broken in.”
In this articles have examples about the importance of firewalls in the industry and in your personal computer.
Markus, H. S. 2001. Firewall guide software reviews.
http://www.firewallguide.com/software.htm Accessed 2002 Feb 20.
“These are some of the best personal firewalls and Internet security products and services that are available free for personal use: Bots, Google Pack. , Intrusion Prevention and Detection , Phishing .
In this page you can see the best firewalls and other products of security for networking.
McKay, N. 1998. China: The great rewall. Web publication:
http://www.wired.com/news/politics/0,1283,16545,00.html Accessed 2002 Feb 20.
“"This is a protest against the treatment of Lin Hai, a man arrested for simply sending email to the US who now faces life in prison," said Bronc Buster, a cracker and computer science post-graduate student in California.”
“The crackers used bogus Unix shell accounts in Chicago, New York, Germany, and Hong Kong to cover their tracks.”
This article is about cracker, what they’re think, what they’re do and everything about they.
“The Firewalls FAQ is currently undergoing revision. The maintainers welcome input and comments on the contents of this FAQ.”
“A firewall is a system or group of systems that enforces an access control policy between two networks. The actual means by which this is accomplished varies widely, but in principle, the firewall can be thought of as a pair of mechanisms: one which exists to block traffic, and the other which exists to permit traffic.”
Ingham, K., Forrest S., A History and Survey of Network Firewalls, University of New Mexico, http://www.cs.unm.edu/~treport/tr/02-12/firewall.pdf, 2001.
“The protocols used on the Internet for these layers, as well as all other Internet
standards are speci_ed by documents known as Requests for Comments (RFCs).”
“Examples of successful or attempted intrusions around the same time include:
Cliord Stoll's discovery of German spies tampering with his system [Stoll 1988;
1989], and Bill Cheswick's \Evening with Berferd" [1992] in which he set up a simple
Electronic \jail" for an attacker. In this jail, the attacker was unable to a_ect
the real system but was left with the impression that he or she had successfully
broken in.”
In this articles have examples about the importance of firewalls in the industry and in your personal computer.
Markus, H. S. 2001. Firewall guide software reviews.
http://www.firewallguide.com/software.htm Accessed 2002 Feb 20.
“These are some of the best personal firewalls and Internet security products and services that are available free for personal use: Bots, Google Pack. , Intrusion Prevention and Detection , Phishing .
In this page you can see the best firewalls and other products of security for networking.
McKay, N. 1998. China: The great rewall. Web publication:
http://www.wired.com/news/politics/0,1283,16545,00.html Accessed 2002 Feb 20.
“"This is a protest against the treatment of Lin Hai, a man arrested for simply sending email to the US who now faces life in prison," said Bronc Buster, a cracker and computer science post-graduate student in California.”
“The crackers used bogus Unix shell accounts in Chicago, New York, Germany, and Hong Kong to cover their tracks.”
This article is about cracker, what they’re think, what they’re do and everything about they.
juanmoreno- Posts : 17
Join date : 2011-08-22
Support sheet
Support:
(16/200)
User type: 0
Page 1 of 1
Permissions in this forum:
You cannot reply to topics in this forum