Up: No Title
Previous: Konfigurationshinweise
- Bello89
- Steven M. Bellovin.
Security Problems in the TCP/IP Protocol Suite.
Computer Communication Review, Vol. 19, No. 2, pages 32-48, April 1989.
- Bisch94
- Hans-Peter Bischof. Der große Lauschangriff.
unix/mail, Seiten 62-66, Dezember 1994.
- Ches94
- William R. Cheswick and Steven M. Bellovin.
Firewalls and Internet Security. Addison-Wesley Publishing
Company, Reading, Massachusetts, first edition, 1994
- Cisco
- CISCO Systems Inc.
Router Products Configuration and Reference.
Release 9.1., Menlo Park.
- DEC94a
- Digital Equipment Corporation.
Digital`s Firewall Service, Administrator`s Guide.
Maynard, Massachusetts, third draft, 1994.
- DEC94b
- Digital Equipment Corporation.
Digital`s Firewall Service, User`s Guide.
Maynard, Massachusetts, second draft, 1994.
- DEC94c
- Digital Equipment Corporation.
Digital`s Firewall Service, Introductory Guide.
Maynard, Massachusetts, V 1.0, 1994.
- Ellis94
- James Ellis, Barbara Fraser and Linda Pesante.
Keeping Internet Intruders Away.
Unix Review, pages 35-44, September 1994.
- Farrow92
- Rik Farrow. Improve Your Security.
UNIXWORLD, pages 59-62, April 1992.
- Farrow94
- Rik Farrow. Protecting Your Network.
Open Computing, pages 83-84, October 1994.
- Garf92
- Simson Garfinkel and Gene Spafford.
Practical UNIX Security. O`Reilly and Associates, Inc.
Sebastopol, 1992.
- High94
- Harold Joseph Highland.
Random Bits & Bytes. Computers & Security, pages 192-201,
Vol. 13, No.3, 1994.
- Hoover95
- Alton Hoover. Securing the Enterprise.
Internet World, pages 39-43, February 1995.
- IBM94
- IBM Corporation.
Secured Network Gateway Version 1.2, Installation, Configuration and Administration Guide.
Research Triangle Park, North Carolina, 1994.
- Kienle94
- Michael Kienle. Standhafte Mauern.
iX, Seiten 130-139, Juli 1994.
- Koblas92
- David Koblas and Michelle R. Koblas.
Socks. In UNIX Security III Symposium, pages 77-83,
Baltimore, MD, September 14-17, 1992. USENIX.
- Lynch93
- Daniel C. Lynch and Marshall T. Rose.
Internet System Handbook. Addison-Wesley Publishing Company,
Reading, Massachusetts, first edition, 1993.
- Morin94
- Richard Morin. Security Resources.
Unix Review, pages 91-92, August 1994.
- Mui92
- Linda Mui. Improving X-Windows Security.
UNIXWORLD, pages 115-122, December 1992.
- Ranum92
- Marcus J. Ranum.
A Network Firewall. In Proc. World Conference on System Administration and Security, Washington, D.C., July 1992.
ftp://DECUAC.DEC.COM/pub/docs/firewalls/firewall.ps
- Ranum94
- Marcus Ranum. Internet firewall protection.
Open Computing, pages 95-99, September 1994.
- RFC742
- K. Harrenstein.
Name/Finger Protocol, 1977.
- RFC768
- J. Postel.
User Datgram Protocol, 1980.
- RFC791
- J. Postel.
Internet Protocol, 1981.
- RFC792
- J. Postel.
Internet Control Message Protocol, 1981.
- RFC793
- J. Postel.
Transmission Control Protocol, 1981.
- RFC821
- J. Postel.
Simple Mail Transfer Protocol, 1982.
- RFC854
- J. Postel and J. Reynolds,
Telnet Protocol Specification, 1983.
- RFC959
- J. Postel and J. Reynolds,
File Transfer Protocol, 1985.
- RFC977
- Brian Kantor and Phil Lapsley.
Network News Transfer Protocol, a Proposed Standard for the Stream-Based Transmission of News, 1986.
- RFC1034
- P. Mockapetris.
Domain names - concepts and facilities, 1987.
- RFC1035
- P. Mockapetris.
Domain names - implementation and specification, 1987.
- RFC1057
- Sun Microsystems Inc.
RPC: Remote Procedure Call Protocol, 1988.
- RFC1059
- D. Mills.
Network Time Protocol (Version 1), Specification and Implementation, 1988.
- RFC1157
- J. Case, M. Fedor, M. Schoffstall and J. Davin.
A Simple Network Management Protocol, 1990.
- RFC1258
- B. Kantor.
BSD Rlogin, 1991.
- RFC1579
- Steven M. Bellovin.
Firewall-friendly FTP, 1994.
- RFC1631
- K. Egevang, P. Francis.
The IP Network Address Translator (NAT), 1994.
- Schwart95
- Winn Schwartau. Beyond the Firewall.
Internet World, pages 44-48, February 1995.
- SecDyn94
- Security Dynamics Technologies.
Securing the Information Age Minute by Minute.
Swallowfield, Reading, 1994.
- Shel92
- Dennis Sheldrick.
Security and the X-Windows System.
UNIXWORLD, pages 103-110, January 1992.
- Smoot92
- Carl-Mitchell Smoot and John S. Quarterman.
Building Internet Firewalls. UNIXWORLD,
pages 93-102, February, 1992.
- Stempel94
- Steffen Stempel und Hans-Joachim Knobloch.
Netwerksicherheit durch Authentifikationsverfahren.
Spektrum der Wissenschaft, Seiten 70-71, Mai 1994.
- Sun94a
- Sun Microsystems, Inc.
FireWall-I, A White Paper.
Mountain View, California, 1994.
- Sun94b
- Sun Microsystems, Inc.
Firewall-I, Installation and User`s Guide, Release 1.0
Mountain View, California, 1994.
- Sun95a
- Sun Microsystems, Inc.
Solstice FireWall-I, Principles of Operations, Version 1.2
Mountain View, California, 1995.
http://www.sun.com
- Sun95b
- Sun Microsystems, Inc.
Solstice FireWall-I, Configuration in a Nutshell, Version 1.2
Mountain View, California, 1995.
http://www.sun.com
- Taylor95
- Dave Taylor and Rosalind Resnick.
Better Safe. Internet World, pages 32-93, February 1995.
- TIS93
- Trusted Information Systems, Inc.
Manpages. 1993.
ftp://FTP.TIS.COM/pub/firewalls/toolkit/fwtk-doc-only.tar.Z.
- TIS94a
- Trusted Information Systems, Inc.
Firewalls User`s Overview. 1994.
ftp://FTP.TIS.COM/pub/firewalls/toolkit/fwtk-doc-only.tar.Z.
- TIS94b
- Trusted Information Systems, Inc.
TIS Firewall Toolkit, Configuration and Administration. 1994.
ftp://FTP.TIS.COM/pub/firewalls/toolkit/fwtk-doc-only.tar.Z.
- Wall94
- Paul Wallich. Piraten im Datennetz.
Spektrum der Wissenschaft, Seiten 64-70, Mai 1994.
- Weiss95
- Aaron Weiss. Unlawful Entry.
Internet World, pages 58-62, February 1995.
- X.800
- CCITT
Recommendation X.800: Security Architecture for Open Systems Interconnection for CCITT Applications. Geneva, 1991.
Root on HPHEGER0
8/28/1998