  
Zur Person
  
Größere Projekte
  
IT Incident Response
  
Publikationen
  
PGP-Schlüssel
  
Impressum
|
Literaturverzeichnis [Campbell 1988] bis [Duff 1989]
- [Campbell 1988] ETHICS and COMPUTER SECURITY : Cause and Effect /
Campbell, M. - In: 16. Annual Computer Science Conference, CSC'88. - New York,
NY: ACM Press, 1988. - S. 384-390.
- [Carl-Mitchell, Quarterman 1992] Building Internet Firewalls /
Carl-Mitchell, S.; Quarterman, J. S. - In: UNIX/WORLD. - Vol. 9, Nr. 2,
Februar 1992, S. 93-102.
- [Cerf 1989] Ethics and the Internet / Cerf, V. - In: Communications of
the ACM. - Vol. 32, Nr. 6, Juni 1989, S. 710.
- [CERT 04/1989] WANK Worm On SPAN Network / Computer Emergency Response
Team. - In: CERT Advisory. - Nr. 89:04, 17. Oktober 1989.
- [CERT 1990] Computer Emergency Response Team System (CERT System) :
Operational Framework (Provisional) . - 16. November 1990.
- [Chapman 1989] CPSR Statement on the Computer Virus / Chapman, G. - In:
Communications of the ACM. - Vol. 32, Nr. 6, Juni 1989, S. 699.
- [Cheswick 1992] An Evening with Berferd In Which a Cracker is Lured,
Endured, and Studied / Cheswick, B. - In: 5. International Computer Virus &
Security Conference / Hrsg. v. Lefkon, R. G. - New York, NY, 1992. -
S. 513-523.
- [CIAC A-2 1989] The W.COM Worm affecting VAX VMS Systems / Computer
Incident Advisory Capability. - In: Advisory Notice. - Nr. A-2, 16. Oktober
1989.
- [CIAC A-3 1989] Tools available to check the spread of the WANK Worm
/ Computer Incident Advisory Capability. - In: Advisory Notice. - Nr. A-3, 20.
Oktober 1989.
- [CIAC A-4 1989] Information about a new version of the WANK worm /
Computer Incident Advisory Capability. - In: Advisory Notice. - Nr. A-4, 30.
Oktober 1989.
- [CIAC B-7 1990] BITNET Worm / Computer Incident Advisory Capability. -
In: Information Bulletin. - Nr. B-7, 5. November 1990.
- [CIAC B-12 1991] GAME2 MODULE Worm on BITNET / Computer Incident
Advisory Capability. - In: Information Bulletin. - Nr. B-12, 18. Januar 1991.
- [Clark, Wilson 1987] A Comparison of Commercial and Military Computer
Security Policies / Clark, D. D.; Wilson, D. R. - In: 1987 Symposium on
Security and Privacy. - New York, NY: IEEE Computer Society, 1987. -
S. 184-194.
- [CNRI 1989] Knowbots in the Real World : Workshop on the Protection of
Intellectual Property Rights in a Digital Library System. - Reston, Virginia:
Corporation for National Research Initiative, 1989.
- [Cohen 1984] Computer Viruses : Theory and Experiments / Cohen, F. - In:
Rogue Programs : Viruses, Worms, and Trojan Horses / Hrsg. v. Hoffman, L. J.
- New York, NY: Van Nostrand Reinhold, 1990. - S. 356-376. - [First presented
at the 1984 meeting of IFIP Technical Committee II on computer security].
- [Cohen 1986] Computer Viruses / Cohen, F. B. - Univ. of South California
Dissertation . - Dezember 1986.
- [Cohen 1992] A Case for Benevolent Viruses / Cohen, F. B. - In: 5.
International Computer Virus & Security Conference / Hrsg. v. Lefkon, R. G.
- New York, NY, 1992. - S. 715-726.
- [Crawford et al. 1992] Testbed for Malicious Code Detection : A Synthesis
of Static and Dynamic Analysis Techniques / Crawford, R.; Lo, R.; Crossley,
J.; Fink, G.; Kerchen, P.; Ho, W.; Levitt, K.; Olsson, R.; Archer, M. - In:
5. International Computer Virus & Security Conference / Hrsg. v. Lefkon, R.
G. - New York, NY, 1992. - S. 225-236.
- [Crocker, Pozzo 1989] A Proposal for a Verification-Based Virus Filter
/ Crocker, S.; Pozzo, M. - In: 1989 Symposium on Security and Privacy. - New
York, NY: IEEE Computer Society, 1989. - S. 319-324.
- [Davies, Price 1989] Security for Computer Networks : An Introduction to
Data Security in Teleprocessing and Electronic Funds Transfer / Davies, D. W.;
Price, W. L. - 2. Aufl. - Chichester, England: John Wiley & Sons, 1989.
- [DDN MGT 50/1988] Worm (Benign) / DDN Network Info Center. - In: DDN
Management Bulletin. - Nr. 50, 23. Dezember 1988.
- [DDN SEC 03/1989] W.COM ( WANK ) Worm On SPAN Network / DDN Security
Coordination Center. - In: DDN Security Bulletin. - Nr. 3, 18. Oktober 1989.
- [Denning 1982] Cryptography and Data Security / Denning, D. E. - Reading,
Mass.: Addison-Wesley, 1982.
- [Denning 1987] An Intrusion-detection Model / Denning, D. E. - Nachdruck
aus: IEEE Transactions on Software Engineering, 1987. - In: Advances in
Computer System Security, Volume III / Hrsg. v. Turn, R. - Dedham, Mass.:
Artech House, 1988. - S. 76-86.
- [Denning et al. 1987] Social Aspects of Computer Security / Denning, D.
E.; Neumann, P. G.; Parker, D. B. - Nachdruck aus: 10. National Computer
Security Conference, 1987. - In: Advances in Computer System Security, Volume
III / Hrsg. v. Turn, R. - Dedham, Mass.: Artech House, 1988. - S. 87-92.
- [Denning 1990] Computers Under Attack / Hrsg. v. Denning, P. J. -
Reading, Mass.: Addison-Wesley, 1990.
- [Denning 1990a] The Internet Worm / Denning, P. J. - In: Computers Under
Attack / Hrsg. v. Denning, P. J. - Reading, Mass.: Addison-Wesley, 1990. -
S. 193-200.
|
|
- [Denning 1990b] Computer Viruses / Denning, P. J. - In: Computers Under
Attack / Hrsg. v. Denning, P. J. - Reading, Mass.: Addison-Wesley, 1990. -
S. 285-292.
- [Denning 1990c] Sending a Signal / Denning, P. J. - In: Communications
of the ACM. - Vol. 33, Nr. 8, August 1990, S. 11+13.
- [Desmedt 1987] Is there an ultimate use of cryptography? / Desmedt, Y.
G. - In: Advances in Cryptology, Crypto'86, 1986 / Hrsg. v. Odlyzko, A. -
Berlin: Springer, 1987. - S. 459-463.
- [Desmedt 1991] The Next Generation of Computer Threats / Desmedt, Y. G.
- In: 4. Annual Computer Virus & Security Conference / Hrsg. v. Lefkon, R. G.
- New York, NY, 1991. - S. 596-607.
- [DFN 1992] CERT im DFN / DFN-Verein. - Beschränkte Ausschreibung mit
Anforderungsbeschreibung eines DFN-Projektes CERT im DFN vom 17. Juli 1992.
- [Dierstein 1985] Computer-Viren : Wie sieht ein Programm-Virus aus und
was bewirkt es? / Dierstein, R. - In: KES. - Vol. 1, Nr. 3, 1985, S. 77-86.
- [Dierstein 1985a] Computer-Viren : Gegenmaßnahmen / Dierstein, R.
- In: KES. - Vol. 1, Nr. 4, 1985, S. 125-136.
- [Dierstein 1990] Das Panama- oder AIDS-Programm / Dierstein, R. - In:
KES. - Vol. 6, Nr. 1, 1990, S. 4-14.
- [Dierstein 1990a] Viren als Aprilscherz / Dierstein, R. - In: KES. -
Vol. 6, Nr. 2, 1990, S. 98-100.
- [Droms 1988] The Knowbot Information Service / Droms, R. - Internet
Draft, Dezember 1988.
- [Duff 1989] Experience with Viruses on UNIX Systems / Duff, T. - In:
Computing Systems. - Vol. 2, Nr. 2, Frühling 1989, S. 155-171.
|