Home Nach oben Feedback Inhalt Suchen AGB

 Infoquellen

Besuchen Sie jetzt unseren Online Shop www.tos.mynetcologne.de ..::..::..::..::..Schauen Sie mal unsere Service Produkte und unsere Service Angebote an es LOHNT sich.... ..::..::..::..::..

[Under Construction]

              

 

 

 

 

 

Internet Firewalls and Network Security (Second Edition). Chris Hare und Karanjit Siyan. New Riders. ISBN: 1-56205-632-8. 1996.

Internet Firewalls. Scott Fuller und Kevin Pagan. Ventana Communications Group Inc. ISBN: 1-56604-506-1. 1997.

Building Internet Firewalls. D. Brent Chapman und Elizabeth D. Zwicky. O'Reilly & Associates. ISBN: 1-56592-124-0. 1995.

Firewalls and Internet Security: Repelling the Wily Hacker. Addison-Wesley Professional Computing. William R. Cheswick und Steven M. Bellovin. ISBN: 0-201-63357-4. 1994.

Actually Useful Internet Security Techniques. Larry J. Hughes, Jr. New Riders. ISBN 1- 56205-508-9. 1995.

Internet Security Resource Library: Internet Firewalls and Network Security, Internet Security Techniques, Implementing Internet Security. New Riders. ISBN: 1-56205-506-2. 1995.

Firewalls FAQ. Marcus J. Ranum. http://www.cis.ohio-state.edu/hypertext/faq/usenet/ firewalls-faq/faq.html.

NCSA Firewall Policy Guide. Kompiliert von Stephen Cobb, Director of Special Projects. National Computer Security Association. http://www.ncsa.com/fpfs/fwpg_p1.html.

There Be Dragons. Steven M. Bellovin. Protokoll des Third Usenix Unix Security Symposium, Baltimore, September 1992. AT&T Bell Laboratories, Murray Hill, NJ. 15. August 1992.

Rating of application layer proxies. Michael Richardson. http://www.sandelman.ottawa.on.ca/SSW/proxyrating/proxyrating.html.

Keeping your site comfortably secure: An Introduction to Internet Firewalls. John P. Wack und Lisa J. Carnahan. National Institute of Standards and Technology. http:// csrc.ncsl.nist.gov/nistpubs/800-10/.

SQL*Net and Firewalls. David Sidwell und Oracle Corporation. http://www.zeuros.co.uk/ firewall/library/oracle-and-fw.pdf.

Covert Channels in the TCP/IP Protocol Suite. Craig Rowland. Rotherwick & Psionics Software Systems Inc. http://csrc.ncsl.nist.gov/nistpubs/800-10.ps

If You Can Reach Them, They Can Reach You. William Dutcher. Ein PC-Week-Online-Special-Report, 19. Juni 1995. http://www.pcweek.com/sr/0619/tfire.html.

Packet Filtering for Firewall Systems. Februar 1995. CERT (und Carnegie-Mellon University). ftp://info.cert.org/pub/tech_tips/packet_filtering.

Network Firewalls. Steven M. Bellovin und William R. Cheswick. IEEECM, 32(9), pp. 50- 57, September 1994.

Session-Layer Encryption. Matt Blaze und Steve Bellovin. Protokoll des Usenix Security Workshop, Juni 1995.

A Network Perimeter with Secure External Access. Frederick M. Avolio und Marcus J. Ranum. Ein Papier, das Details einer Implementierung einer Firewall im Weißen Haus gibt. http://www.alw.nih.gov/Security/FIRST/papers/firewall/isoc94.ps.

Packets Found on an Internet. Steven M. Bellovin. Lambda. Interessante Analyse von Paketen, die am Anwendungsschicht-Gateway von AT&T erscheinen. ftp://ftp.research.att.com/dist/smb/packets.ps .

Using Screend to Implement TCP/IP Security Policies. Jeff Mogul. Rotherwick and Digital. http://www.zeuros.co.uk/firewall/library/screend.ps.

Firewall Application Notes. Livingston Enterprises, Inc. Gutes Dokument, das mit einer Beschreibung darüber beginnt, wie man eine Firewall aufbaut. Außerdem behandelt es Anwendungsschicht-Proxies, Sendmail in Relation zu Firewalls und die Charakteristiken eines Bastion-Hosts. http://www.telstra.com.au/pub/docs/security/firewall-1.1.ps.Z.

X Through the Firewall, and Other Application Relays. Treese/Wolman. Digital Equipment Corp. Cambridge Research Lab. ftp://crl.dec.com/pub/DEC/CRL/tech-reports/ 93.10.ps.Z.

Intrusion Protection for Networks 171. BYTE Magazine. April 1995.

Benchmarking Methodology for Network Interconnect Devices (RFC 1944). S. Bradner und J. McQuaid. ftp://ds.internic.net/rfc/rfc1944.txt.

Vulnerability in Cisco Routers Used as Firewalls. Computer Incident Advisory Capability Advisory: Number D-15. http://ciac.llnl.gov/ciac/bulletins/d-15.shtml.

WAN-Hacking with AutoHack - Auditing Security Behind the Firewall. Alec D. E. Muffett. Geschrieben vom Autor von Crack, dem berühmten Programm zum Knacken von Paßwörtern. Dieses Dokument behandelt Methoden zum Auditing von Sicherheit hinter einer Firewall (und das Auditing eines sehr großen Netzwerks, das Zehntausende von Hosts umfaßt.) http://solar.net.ncu.edu.tw/~jslee/me/docs/muffett-autohack.ps.

Windows NT Firewalls Are Born. PC Magazine. 4. February 1997. http://www.pcmagazine.com/features/firewall/_open.htm .

IP v6 Release and Firewalls. Uwe Ellermann. 14. Worldwide Congress on Computer and Communications Security. Protection, pp. 341-354, Juni 1996.

The SunScreen Product Line Overview. Sun Microsystems. http://www.sun.com/security/ overview.html.

Product Overview for IBM Internet Connection Secured Network Gateway for AIX, Version 2.2. IBM firewall information. http://www.ics.raleigh.ibm.com/firewall/overview.htm.

 

Home ] Nach oben ]

Senden Sie E-Mail mit Fragen oder Kommentaren zu dieser Website an: tos.computer@gmx.de 
Copyright © 2003 TOS Computer Systeme
Stand: 14. November 2004