Friday 26 October 2012

[1] K. Hafner, M.Lyon. Where Wizards Stay Up Late.
Simon & Schuster, New York, 1996.
[2] E.H. Spa ord. The internet worm program: An
analysis. Purdue Technical Report CSD-TR-823,
Deoartment of Computer Sciences Purdue University,
West Lafayette, IN. 1988.
[3] D. Seeley. A tour of the worm. Department of
Computer Science, University of Utah, 1988.
[4] M. Eichin, J. Rochlis. With microscope and tweezers:
An analysis of the internet virus of november 1988.
Massachusetts Institute of Technology, 1988.
[5] M. Williams. Ebay, amazon, buy.com hit by attacks,
02/09/00. IDG News Service, 02/09/00,
http://www.nwfusion.com/news/2000/0209attack.html
- visited 18.10.2000.
[6] L. Stein. The world wide web security faq, version
2.0.1. http://www.w3.org/Security/Faq/ - visited
04.10.2000.
[7] S.M Bellovin, W.R. Cheswick. Firewalls and Internet
Security. Addison Wesley Longman, 1994.
[8] Attrition mirrored sites.
http://Attrition.org/mirror/attrition/ - visited
03.11.2000.
[9] Dr. J.D. Howard. An analysis of security incidents on
the internet 1989 - 1995. Carnegie Mellon University,
Carnegie Institute of Technology,
http://www.cert.org/research/JHThesis/ - visited
02.11.2000.
[10] J. Elliot. Distributed denial of service attacks and the
zombie ant e ect. IT Professional, Mar./Apr. 2000,
pp55-57.

No comments:

Post a Comment