-
3
-
-
0008302889
-
Use of a taxonomy of security faults
-
COAST Laboratory, Purdue University
-
T. Aslam et al., Use of a taxonomy of security faults, COAST Laboratory, Technical Report TR-96-051, Purdue University, 1996.
-
(1996)
Technical Report TR-96-051
-
-
Aslam, T.1
-
5
-
-
0003956784
-
-
Princeton, NJ: Princeton University Press
-
von Clausewitz C. On War. 1832;Princeton University Press, Princeton, NJ.
-
(1832)
On War
-
-
Von Clausewitz, C.1
-
9
-
-
0343472282
-
-
Full text at Carnegie Mellon University, Software Engineering Institute, Security Improvement Module CMU/SEI-SIM-001
-
R. Firth et al., Detecting signs of intrusion, Full text at http://www.cert.org, Carnegie Mellon University, Software Engineering Institute, Security Improvement Module CMU/SEI-SIM-001, 1997.
-
(1997)
Detecting Signs of Intrusion
-
-
Firth, R.1
-
10
-
-
0343908079
-
-
US Army Intelligence Center, Full-text at US Army
-
US Army Intelligence Center, FM 34-130 Intelligence Preparation of the Battlefield, Full-text at http://155.217.58.58/atdls.htm, US Army, 1994.
-
(1994)
FM 34-130 Intelligence Preparation of the Battlefield
-
-
-
13
-
-
84992238930
-
-
Fyodor, nmap
-
Fyodor, nmap, http://www.insecure.org/, 2000.
-
(2000)
-
-
-
14
-
-
0004114009
-
-
Full text at CIA, Center for the Study of Intelligence
-
R. Heuer, Psychology of intelligence analysis, Full text at http://www.odci.gov/csi/, CIA, Center for the Study of Intelligence, 1999.
-
(1999)
Psychology of Intelligence Analysis
-
-
Heuer, R.1
-
15
-
-
0031170033
-
Collaring the cybercrook: An investigator's view
-
D. Icove, Collaring the cybercrook: An investigator's view, IEEE Spectrum, 1997.
-
(1997)
IEEE Spectrum
-
-
Icove, D.1
-
19
-
-
0343472275
-
-
Full text at COAST TR 93-01, Department of Computer Sciences, Purdue University
-
G. Kim et al., The design of a system integrity monitor: Tripwire, Full text at http://www.cerias.purdue.edu/, COAST TR 93-01, Department of Computer Sciences, Purdue University, 1993.
-
(1993)
The Design of a System Integrity Monitor: Tripwire
-
-
Kim, G.1
-
20
-
-
0343472276
-
-
Full text at CarnegieMellonUniversity, SoftwareEngineeringInstitute, SecurityImprovementModuleCMU/SEI-SIM-006
-
K.P. Kossakowski et al., Responding to intrusions, Full text at http://www.cert.org, Carnegie Mellon University, Software Engineering Institute, Security Improvement Module CMU/SEI-SIM-006, 1999.
-
(1999)
Responding to Intrusions
-
-
Kossakowski, K.P.1
-
21
-
-
0030676601
-
How to systematically classify computer security intrusions
-
IEEE Computer Society Press, Silver Spring, MD
-
U. Lindqvist et al., How to systematically classify computer security intrusions, in: Proceedings of the 1997 IEEE Symposium on Security and Privacy, IEEE Computer Society Press, Silver Spring, MD, 1997.
-
(1997)
Proceedings of the 1997 IEEE Symposium on Security and Privacy
-
-
Lindqvist, U.1
-
23
-
-
0343472277
-
-
Doctrine Division, Full text at US Marine Corps, MCCDC
-
Doctrine Division, MCDP 1-3 Tactics, Full text at http://www.doctrine.usmc.mil, US Marine Corps, MCCDC, 1997.
-
(1997)
MCDP 1-3 Tactics
-
-
-
24
-
-
0343036486
-
-
Doctrine Division, Full text at US Marine Corps, MCCDC
-
Doctrine Division, MCDP 2 Intelligence, Full text at http://www.doctrine.usmc.mil, US Marine Corps, MCCDC, 1997.
-
(1997)
MCDP 2 Intelligence
-
-
-
25
-
-
0343036484
-
-
US Marine Corps, Marine Corps Institute
-
MCI 7510B Tactical Fundamentals, US Marine Corps, Marine Corps Institute, 1984.
-
(1984)
MCI 7510B Tactical Fundamentals
-
-
-
26
-
-
0343472278
-
-
Doctrine Division, Full text at US Marine Corps, MCCDC
-
Doctrine Division, MCWP 2-1 Intelligence Operations, Full text at http://www.doctrine.usmc.mil, US Marine Corps, MCCDC, 1998.
-
(1998)
MCWP 2-1 Intelligence Operations
-
-
-
31
-
-
0342602245
-
-
Full text at Ohio State University, UTS Network Security Group
-
S. Romig, State of the hack, Full text at ftp://ftp.net.ohio-state.edu:/users/romig/talks/state-of-the-hack, Ohio State University, UTS Network Security Group.
-
State of the Hack
-
-
Romig, S.1
-
33
-
-
26444582561
-
Responding to computer security incidents: Guidelines for incident handling
-
Full text at LLNL
-
E.E. Schultz et al., Responding to computer security incidents: Guidelines for incident handling, Full text at ftp://ciac.llnl.gov/pub/ciac/ciacdocs/ihg.txt, Technical report from Department of Energy, LLNL, 1990.
-
(1990)
Technical Report from Department of Energy
-
-
Schultz, E.E.1
-
36
-
-
0343472271
-
-
Full text at Carnegie Mellon, Software Engineering Institute, Handbook CMU/SEI-98-HB-001 AA avenue of approach AO areas of operation AOI areas of interest ARNC attack repair, neutralization and containment C-IPB Cyber-IPB CD compromised device COA course of action ID intrusion detection IDS intrusion-detection system IPB intelligence preparation of the battlespace IR incident response KCD known compromised device LCD likely compromised device MO method of operations USMC US Marine Corps
-
West-Brown et al., Handbook for Computer Security Incident Response Teams (CSIRTS), Full text at http://www.sei.cmu.edu/, Carnegie Mellon, Software Engineering Institute, Handbook CMU/SEI-98-HB-001, 1998 AA avenue of approach AO areas of operation AOI areas of interest ARNC attack repair, neutralization and containment C-IPB Cyber-IPB CD compromised device COA course of action ID intrusion detection IDS intrusion-detection system IPB intelligence preparation of the battlespace IR incident response KCD known compromised device LCD likely compromised device MO method of operations USMC US Marine Corps.
-
(1998)
Handbook for Computer Security Incident Response Teams (CSIRTS)
-
-
West-Brown1
|