Zur Person
Größere Projekte
IT Incident Response
Publikationen
PGP-Schlüssel
Impressum
|
Literaturverzeichnis [Kahn, Cerf 1988] bis [Mullender 1989]
- [Kahn, Cerf 1988] The World of Knowbots : An Open Architecture for a
Digital Library System and a Plan for its Development / Kahn, R. E.; Cerf, V.
G. - Reston, Virginia: Corporation for National Research Initiatives, 1988.
- [Karger 1987] Limiting the Damage Potential of Discretionary Trojan
Horses / Karger, P. A. - In: 1987 Symposium on Security and Privacy. - New
York, NY: IEEE Computer Society, 1987. - S. 32-37.
- [Kerningham, Pike 1987] Der UNIX-Werkzeugkasten : Programmieren mit UNIX
/ Kerningham, B.; Pike, R. - München: Hanser, 1987.
- [Kersten 1991] ZSI : Ergebnisse und zukünftige Projekte / Kersten,
H. - In: Sicherheitsaspekte in der Informationstechnik / Hrsg. v. Cerny, D.;
Kersten, H. - Braunschweig: Vieweg, 1991. - S. 64-80.
- [Kersten 1992] Neue Aufgabenstellungen des Bundesamtes für
Sicherheit in der Informationstechnik / Kersten, H. - In: Datenschutz und
Datensicherung. - Vol. 16, Nr. 6, Juni 1992, S. 293-297.
- [Kindberg et al. 1987] Worm Programs / Kindberg, T.; Sahiner, A. V.;
Paker, Y. - In: Distributed Operating Systems - Theory and Practice. - Berlin:
Springer, 1987. - S. 355-379.
- [King 1992] Identifying and Controlling Undesirable Program Behaviors /
King, M. M. - In: 5. International Computer Virus & Security Conference /
Hrsg. v. Lefkon, R. G. - New York, NY, 1992. - S. 213-224.
- [Klein] Foiling the Cracker: A Survey of, and Improvements to, Password
Security / Klein, D. V. - Carnegie Mellon University, Software Engineering
Institute. - Pittsburgh, PA.
- [Kohl et al. 1990] The Kerberos Network Authentication Service / Kohl,
J. T.; Neumann, B. C.; Steiner, J. G. - Massachusetts Institute of Technology.
- Cambridge, Mass. - RFC Draft 3 vom 8. Oktober 1990.
- [Kurzban 1989] Defending against Viruses and Worms / Kurzban, S. A. - In:
ACM SIGUCCS Newsletter. - Vol. 19, Nr. 3, Herbst 1989, S. 11-23.
- [Lenstra, Manasse 1990] Factoring by electronic mail / Lenstra, A. K.;
Manasse, M. S. - In: Advances in Cryptology, EUROCRYPT'89 / Hrsg. v.
Quisquater, J. - J.; Vandewalle, J. - Berlin: Springer, 1990. - S. 355-371.
- [Linde 1975] Operating System Penetration / Linde, R. R. - In: 44.
National Computer Conference. - Montvale, NJ: AFIPS-Press, 1975. - S. 361-368.
- [Linn 1990] Practical Authentication for Distributed Computing / Linn,
J. - In: 1990 Symposium on Research in Security and Privacy. - Los Alamitos,
Calif.: IEEE Computer Society, 1990. - S. 31-40.
- [Luan, Gligor 1990] On Replay Detection in Distributed Systems / Luan,
S. - W.; Gligor, V. D. - In: 10. International Conference on Distributed
Computing Systems. - Los Alamitos, Calif.: IEEE Computer Society, 1990. -
S. 188-195.
- [Lunt 1988] Automated Audit Trail Analysis and Intrusion Detection : A
survey / Lunt, T. F. - In: 11. National Computer Security Conference. - o. O.,
1988. - S. 65-73.
- [Lunt 1992] Tools for intrusion detection - State-of-the-art and trends
/ Lunt, T. F. - In: SECUNET '92 / Hrsg. v. Lippold, H.; Schmitz, P. -
Braunschweig: Vieweg, 1992. - S. 351-369.
- [Lux et al. 1989] On the Implementation of Abstract Data Types in BirliX
/ Lux, W.; Härtig, H.; Kühnhauser, W. E. Gesellschaft für
Mathematik und Datenverarbeitung. - 12. Mai 1989.
- [Madsen 1988] The World Meganetwork and Terrorism / Madsen, C. W. - In:
Computers & Security. - Vol. 7, Nr. 4, August 1988, S. 347-352.
- [Madsen 1992] Government-Sponsored Computer Warfare and Sabotage /
Madsen, W. - In: Computers & Security. - Vol. 11, Nr. 3, Mai 1992, S. 233-236.
- [Manber 1990] Chain Reactions in Networks / Manber, U. - In: Computer.
- Vol. 23, Nr. 10, Oktober 1990, S. 57-63.
- [Markoff 1988] 'Virus' in Military Computers Disrupts Systems Nationwide
/ Markoff, J. - In: The New York Times. - Vol. 138, 4. November 1988,
S. I,1:1.
- [Markoff 1988a] Author of Computer 'Virus' Is Son of N.S.A. Expert on
Data Security : Cornell Graduate Student Described as 'Brilliant' / Markoff,
J. - In: The New York Times. - Vol. 138, 5. November 1988, S. I,1:1.
- [Markoff 1988b] How a Need for Challenge Seduced Computer Expert /
Markoff, J. - In: The New York Times. - Vol. 138, 6. November 1988, S. I,1:1.
- [Markoff 1988c] Computer Invasion : 'Back Door' Ajar / Markoff, J. - In:
The New York Times. - Vol. 138, 7. November 1988, S. II,10:4.
- [Markoff 1988d] Living With the Computer Whiz Kids : Hackers appear to
be both a national treasure and a headache / Markoff, J. - In: The New York
Times. - Vol. 138, 8. November 1988, S. I,16:1.
- [Markoff 1988e] Computer Experts Say Virus Carried No Hidden Dangers /
Markoff, J. - In: The New York Times. - Vol. 138, 9. November 1988, S. I,18:1.
- [Markoff 1988f] The Computer Jam : How It Came About / Markoff, J. - In:
The New York Times. - Vol. 138, 9. November 1988, S. IV,10:1.
- [Markoff 1988g] U.S. Is Moving to Restrict Access To Facts About Computer
Virus / Markoff, J. - In: The New York Times. - Vol. 138, 11. November 1988,
S. I,28:5.
- [Markoff 1989] Student Blamed for Rogue Computer Program : Morris was a
'completely absorbed' hacker / Markoff, J. - In: The New York Times. -
Vol. 138, 4. April 1989, S. I,16:3.
- [Markoff 1989a] Cornell Suspends Computer Student : School Says He Was
Author of Program That Jammed a Nationwide Network / Markoff, J. - In: The New
York Times. - Vol. 138, 25. Mai 1989, S. I,16:6.
- [Markoff 1989b] Student, After Delay, Is Charged In Crippling of Computer
Network / Markoff, J. - In: The New York Times. - Vol. 138, 27. Juli 1989,
S. I,17:2.
- [Markoff 1990] Ex-Student Faces Trial Over Computer Chaos / Markoff, J.
- In: The New York Times. - Vol. 139, 7. Januar 1990, S. I,18:5.
- [Markoff 1990a] Student Testifies His Error Jammed Computer Network /
Markoff, J. - In: The New York Times. - Vol. 139, 19. Januar 1990, S. I,19:1.
- [Markoff 1990b] From Hacker to Symbol / Markoff, J. - In: The New York
Times. - Vol. 139, 24. Januar 1990, S. I,19:1.
- [Markoff 1990c] Computer Intruder Is Found Guilty / Markoff, J. - In: The
New York Times. - Vol. 139, 23. Januar 1990, S. I,21:1.
- [Markoff 1990d] Caller Says He Broke Computers' Barriers To Taunt the
Experts / Markoff, J. - In: The New York Times. - Vol. 139, 21. März
1990, S. I,1:1.
|