next up previous contents
Up: No Title Previous: Konfigurationshinweise

Literatur

Bello89
Steven M. Bellovin. Security Problems in the TCP/IP Protocol Suite. Computer Communication Review, Vol. 19, No. 2, pages 32-48, April 1989.

Bisch94
Hans-Peter Bischof. Der große Lauschangriff. unix/mail, Seiten 62-66, Dezember 1994.

Ches94
William R. Cheswick and Steven M. Bellovin. Firewalls and Internet Security. Addison-Wesley Publishing Company, Reading, Massachusetts, first edition, 1994

Cisco
CISCO Systems Inc. Router Products Configuration and Reference. Release 9.1., Menlo Park.

DEC94a
Digital Equipment Corporation. Digital`s Firewall Service, Administrator`s Guide. Maynard, Massachusetts, third draft, 1994.

DEC94b
Digital Equipment Corporation. Digital`s Firewall Service, User`s Guide. Maynard, Massachusetts, second draft, 1994.

DEC94c
Digital Equipment Corporation. Digital`s Firewall Service, Introductory Guide. Maynard, Massachusetts, V 1.0, 1994.

Ellis94
James Ellis, Barbara Fraser and Linda Pesante. Keeping Internet Intruders Away. Unix Review, pages 35-44, September 1994.

Farrow92
Rik Farrow. Improve Your Security. UNIXWORLD, pages 59-62, April 1992.

Farrow94
Rik Farrow. Protecting Your Network. Open Computing, pages 83-84, October 1994.

Garf92
Simson Garfinkel and Gene Spafford. Practical UNIX Security. O`Reilly and Associates, Inc. Sebastopol, 1992.

High94
Harold Joseph Highland. Random Bits & Bytes. Computers & Security, pages 192-201, Vol. 13, No.3, 1994.

Hoover95
Alton Hoover. Securing the Enterprise. Internet World, pages 39-43, February 1995.

IBM94
IBM Corporation. Secured Network Gateway Version 1.2, Installation, Configuration and Administration Guide. Research Triangle Park, North Carolina, 1994.

Kienle94
Michael Kienle. Standhafte Mauern. iX, Seiten 130-139, Juli 1994.

Koblas92
David Koblas and Michelle R. Koblas. Socks. In UNIX Security III Symposium, pages 77-83, Baltimore, MD, September 14-17, 1992. USENIX.

Lynch93
Daniel C. Lynch and Marshall T. Rose. Internet System Handbook. Addison-Wesley Publishing Company, Reading, Massachusetts, first edition, 1993.

Morin94
Richard Morin. Security Resources. Unix Review, pages 91-92, August 1994.

Mui92
Linda Mui. Improving X-Windows Security. UNIXWORLD, pages 115-122, December 1992.

Ranum92
Marcus J. Ranum. A Network Firewall. In Proc. World Conference on System Administration and Security, Washington, D.C., July 1992. ftp://DECUAC.DEC.COM/pub/docs/firewalls/firewall.ps

Ranum94
Marcus Ranum. Internet firewall protection. Open Computing, pages 95-99, September 1994.

RFC742
K. Harrenstein. Name/Finger Protocol, 1977.

RFC768
J. Postel. User Datgram Protocol, 1980.

RFC791
J. Postel. Internet Protocol, 1981.

RFC792
J. Postel. Internet Control Message Protocol, 1981.

RFC793
J. Postel. Transmission Control Protocol, 1981.

RFC821
J. Postel. Simple Mail Transfer Protocol, 1982.

RFC854
J. Postel and J. Reynolds, Telnet Protocol Specification, 1983.

RFC959
J. Postel and J. Reynolds, File Transfer Protocol, 1985.

RFC977
Brian Kantor and Phil Lapsley. Network News Transfer Protocol, a Proposed Standard for the Stream-Based Transmission of News, 1986.

RFC1034
P. Mockapetris. Domain names - concepts and facilities, 1987.

RFC1035
P. Mockapetris. Domain names - implementation and specification, 1987.

RFC1057
Sun Microsystems Inc. RPC: Remote Procedure Call Protocol, 1988.

RFC1059
D. Mills. Network Time Protocol (Version 1), Specification and Implementation, 1988.

RFC1157
J. Case, M. Fedor, M. Schoffstall and J. Davin. A Simple Network Management Protocol, 1990.

RFC1258
B. Kantor. BSD Rlogin, 1991.

RFC1579
Steven M. Bellovin. Firewall-friendly FTP, 1994.

RFC1631
K. Egevang, P. Francis. The IP Network Address Translator (NAT), 1994.

Schwart95
Winn Schwartau. Beyond the Firewall. Internet World, pages 44-48, February 1995.

SecDyn94
Security Dynamics Technologies. Securing the Information Age Minute by Minute. Swallowfield, Reading, 1994.

Shel92
Dennis Sheldrick. Security and the X-Windows System. UNIXWORLD, pages 103-110, January 1992.

Smoot92
Carl-Mitchell Smoot and John S. Quarterman. Building Internet Firewalls. UNIXWORLD, pages 93-102, February, 1992.

Stempel94
Steffen Stempel und Hans-Joachim Knobloch. Netwerksicherheit durch Authentifikationsverfahren. Spektrum der Wissenschaft, Seiten 70-71, Mai 1994.

Sun94a
Sun Microsystems, Inc. FireWall-I, A White Paper. Mountain View, California, 1994.

Sun94b
Sun Microsystems, Inc. Firewall-I, Installation and User`s Guide, Release 1.0 Mountain View, California, 1994.

Sun95a
Sun Microsystems, Inc. Solstice FireWall-I, Principles of Operations, Version 1.2 Mountain View, California, 1995.
http://www.sun.com

Sun95b
Sun Microsystems, Inc. Solstice FireWall-I, Configuration in a Nutshell, Version 1.2 Mountain View, California, 1995.
http://www.sun.com

Taylor95
Dave Taylor and Rosalind Resnick. Better Safe. Internet World, pages 32-93, February 1995.

TIS93
Trusted Information Systems, Inc. Manpages. 1993.
ftp://FTP.TIS.COM/pub/firewalls/toolkit/fwtk-doc-only.tar.Z.

TIS94a
Trusted Information Systems, Inc. Firewalls User`s Overview. 1994.
ftp://FTP.TIS.COM/pub/firewalls/toolkit/fwtk-doc-only.tar.Z.

TIS94b
Trusted Information Systems, Inc. TIS Firewall Toolkit, Configuration and Administration. 1994.
ftp://FTP.TIS.COM/pub/firewalls/toolkit/fwtk-doc-only.tar.Z.

Wall94
Paul Wallich. Piraten im Datennetz. Spektrum der Wissenschaft, Seiten 64-70, Mai 1994.

Weiss95
Aaron Weiss. Unlawful Entry. Internet World, pages 58-62, February 1995.

X.800
CCITT Recommendation X.800: Security Architecture for Open Systems Interconnection for CCITT Applications. Geneva, 1991.


Root on HPHEGER0
8/28/1998