|
DataMuseum.dkPresents historical artifacts from the history of: DKUUG/EUUG Conference tapes |
This is an automatic "excavation" of a thematic subset of
See our Wiki for more about DKUUG/EUUG Conference tapes Excavated with: AutoArchaeologist - Free & Open Source Software. |
top - metrics - downloadIndex: T r
Length: 4640 (0x1220) Types: TextFile Names: »refs.t«
└─⟦4f9d7c866⟧ Bits:30007245 EUUGD6: Sikkerheds distributionen └─⟦eed360c96⟧ »./papers/SRI-report/sri-report.troff.tar.Z« └─⟦9ae75bfbd⟧ Bits:30007242 EUUGD3: Starter Kit └─⟦eed360c96⟧ »EurOpenD3/security-doc.tar.Z« └─⟦53b1903f6⟧ └─⟦this⟧ »security-doc/refs.t«
.bp .if e \{\ \& . bp .\} .SH REFERENCES .IP [Eich89] 1.0i Eichin, Mark W., and Jon A. Rochlis. .I "With Microscope and Tweezers:" .I "An Analysis of the Internet Virus of November 1988" . Massachusetts Institute of Technology. February 1989. .IP [Elme88] 1.0i Elmer-DeWitt, Philip. `` `The Kid Put Us Out of Action.' '' .I Time , 132 (20): 76, November 14, 1988. .IP [Gram84] 1.0i Grammp, F. T., and R. H. Morris. ``\s-1UNIX\s0 Operating System Security.'' .I "\s-1AT&T\s0 Bell Laboratories Technical Journal" , 63 (8): 1649-1672, October 1984. .IP [Hind83] 1.0i Hinden, R., J. Haverty, and A. Sheltzer. ``The .SM DARPA Internet: Interconnecting Heterogeneous Computer Networks with Gateways.'' .I "\s-1IEEE\s0 Computer Magazine" , 16 (9): 33-48, September 1983. .IP [McLe87] 1.0i McLellan, Vin. .SM NASA "" `` Hackers: There's More to the Story.'' .I "Digital Review" , November 23, 1987, p. 80. .IP [Morr78] 1.0i Morris, Robert, and Ken Thompson. ``Password Security: A Case History.'' .I "Communications of the \s-1ACM\s0" , 22 (11): 594-597, November 1979. Reprinted in .I "\s-1UNIX\s0 System Manager's Manual" , 4.3 Berkeley Software Distribution. University of California, Berkeley. April 1986. .IP [NCSC85] 1.0i National Computer Security Center. .I "Department of Defense Trusted Computer System Evaluation Criteria" , Department of Defense Standard \s-1DOD\s0 5200.28-\s-1STD\s0, December, 1985. .IP [Quar86] 1.0i Quarterman, J. S., and J. C. Hoskins. ``Notable Computer Networks.'' .I "Communications of the \s-1ACM\s0" , 29 (10): 932-971, October 1986. .IP [Reed84] 1.0i Reeds, J. A., and P. J. Weinberger. ``File Security and the \s-1UNIX\s0 System Crypt Command.'' .I "\s-1AT&T\s0 Bell Laboratories Technical Journal" , 63 (8): 1673-1683, October 1984. .IP [Risk87] 1.0i .I "Forum on Risks to the Public in Computers and Related Systems" . .SM ACM Committee on Computers and Public Policy, Peter G. Neumann, Moderator. Internet mailing list. Issue 5.73, December 13, 1987. .IP [Risk88] 1.0i .I "Forum on Risks to the Public in Computers and Related Systems" . .SM ACM Committee on Computers and Public Policy, Peter G. Neumann, Moderator. Internet mailing list. Issue 7.85, December 1, 1988. .IP [Risk89a] 1.0i .I "Forum on Risks to the Public in Computers and Related Systems" . .SM ACM Committee on Computers and Public Policy, Peter G. Neumann, Moderator. Internet mailing list. Issue 8.2, January 4, 1989. .IP [Risk89b] 1.0i .I "Forum on Risks to the Public in Computers and Related Systems" . .SM ACM Committee on Computers and Public Policy, Peter G. Neumann, Moderator. Internet mailing list. Issue 8.9, January 17, 1989. .IP [Risk90] 1.0i .I "Forum on Risks to the Public in Computers and Related Systems" . .SM ACM Committee on Computers and Public Policy, Peter G. Neumann, Moderator. Internet mailing list. Issue 9.69, February 20, 1990. .IP [Ritc75] 1.0i Ritchie, Dennis M. ``On the Security of \s-1UNIX\s0.'' May 1975. Reprinted in .I "\s-1UNIX\s0 System Manager's Manual" , 4.3 Berkeley Software Distribution. University of California, Berkeley. April 1986. .IP [Schu90] 1.0i Schuman, Evan. ``Bid to Unhook Worm.'' .I "\s-1UNIX\s0 Today!" , February 5, 1990, p. 1. .IP [Seel88] 1.0i Seeley, Donn. .I "A Tour of the Worm" . Department of Computer Science, University of Utah. December 1988. .IP [Spaf88] 1.0i Spafford, Eugene H. .I "The Internet Worm Program: An Analysis" . Technical Report .SM CSD-TR -823. Department of Computer Science, Purdue University. November 1988. .IP [Stee88] 1.0i Steele, Guy L. Jr., Donald R. Woods, Raphael A. Finkel, Mark R. Crispin, Richard M. Stallman, and Geoffrey S. Goodfellow. .I "The Hacker's Dictionary" . New York: Harper and Row, 1988. .IP [Stei88] 1.0i Stein, Jennifer G., Clifford Neuman, and Jeffrey L. Schiller. ``Kerberos: An Authentication Service for Open Network Systems.'' .I "USENIX Conference Proceedings" , Dallas, Texas, Winter 1988, pp. 203-211. .IP [Stol88] 1.0i Stoll, Clifford. ``Stalking the Wily Hacker.'' .I "Communications of the \s-1ACM\s0" , 31 (5): 484-497, May 1988. .IP [Stol89] 1.0i Stoll, Clifford. .I "The Cuckoo's Egg" . New York: Doubleday, 1989. .IP [Sun88a] 1.0i Sun Microsystems. .I "Sun\s-1OS\s0 Reference Manual" , Part Number 800-1751-10, May 1988. .IP [Sun88b] 1.0i Sun Microsystems. .I "System and Network Administration" , Part Number 800-1733-10, May 1988. .IP [Sun88c] 1.0i Sun Microsystems. .I "Security Features Guide" , Part Number 800-1735-10, May 1988. .IP [Sun88d] 1.0i Sun Microsystems. ``Network File System: Version 2 Protocol Specification.'' .I "Network Programming" , Part Number 800-1779-10, May 1988, pp. 165-185.