Bibliography


Baldwin, Robert W., Rule Based Analysis of Computer Security, Massachusetts Institute of Technology, June 1987.

Bellovin, Steve, Using the Domain Name System for System Break-ins, 1992 (unpublished).

Farmer, Dan, and Venema, Wietse, Improving the Security of Your Site by Breaking Into it, comp.security.unix, December 1993.

Massachusetts Institute of Technology, X Window System Protocol, Version 11, 1990.

Shimomura, Tsutomu, private communication.

Sun Microsystems, OpenWindows V3.0.1 User Commands, March 1992.

Bellovin, Steve, Security Problems in the TCP/IP Protocol Suite, Computer Communication Review 19 (2), 1989; a comment by Stephen Kent appears in volume 19 (3), 1989.

Garfinkel, Simson and Spafford, Gene, Practical UNIX Security, O'Reilly and Associates, Inc., 1992.

Hess, David, Safford, David, and Pooch, Udo, A UNIX Network Protocol Study: Network Information Service, Computer Communication Review 22 (5) 1992.

Phreak Accident, Playing Hide and Seek, UNIX style, Phrack, Volume Four, Issue Forty-Three, File 14 of 27.

Ranum, Marcus, Firewalls internet electronic mailing list, Sept 1993.

Schuba, Christoph, Addressing Weaknesses in the Domain Name System Protocol, Purdue University, August 1993.

Thompson, Ken, Reflections on Trusting Trust, Communications of the ACM 27 (8), 1984.