-
1
-
-
0003561143
-
The Next World War
-
Simon and Schuster, Ch. 10
-
Adams. J. (1998) ‘The Next World War’, Simon and Schuster, Ch. 10.
-
(1998)
-
-
Adams, J.1
-
2
-
-
84976720856
-
The “Worm” Programs — Early Experience with a Distributed Computation
-
Shoch, J. F. and Hupp, J. A. (1982) ‘The “Worm” Programs — Early Experience with a Distributed Computation’, Commun. ACM, Vol. 25, No. 3, pp. 172–180.
-
(1982)
Commun. ACM
, vol.25
, Issue.3
, pp. 172-180
-
-
Shoch, J.F.1
Hupp, J.A.2
-
3
-
-
0041065277
-
The Internet Worm: An Analysis
-
Spafford, E. H. (1989) ‘The Internet Worm: An Analysis’, Computer Commun. Review, Vol. 19, No. 1, pp. 17–57.
-
(1989)
Computer Commun. Review
, vol.19
, Issue.1
, pp. 17-57
-
-
Spafford, E.H.1
-
4
-
-
0242444735
-
The Worm Story
-
Spafford, E. H. et al. (1989) ‘The Worm Story’, Commun. ACM, Vol. 32, No. 6, pp. 677–710.
-
(1989)
Commun. ACM
, vol.32
, Issue.6
, pp. 677-710
-
-
Spafford, E.H.1
-
5
-
-
84992971368
-
Web Security in Focus
-
July
-
‘Web Security in Focus’ (1998) Secure Computing, July, pp. 24–33.
-
(1998)
Secure Computing
, pp. 24-33
-
-
-
6
-
-
0032374128
-
CSI Roundtable: Experts Discuss Present and Future Intrusion Detection Systems
-
Power, R. (1998) ‘CSI Roundtable: Experts Discuss Present and Future Intrusion Detection Systems’, Computer Security Journal, Vol. XIV, No. 1, pp. 1–18.
-
(1998)
Computer Security Journal
, vol.14
, Issue.1
, pp. 1-18
-
-
Power, R.1
-
7
-
-
0004210998
-
Building Internet Firewalls
-
O'Reilly and Associates, Ch. 6
-
Chapman, D. B. and Zwicky, E. D. (1995) ‘Building Internet Firewalls’, O'Reilly and Associates, Ch. 6.
-
(1995)
-
-
Chapman, D.B.1
Zwicky, E.D.2
-
8
-
-
84992969694
-
Return of the Hack
-
30th April
-
Smith, S. (1998) ‘Return of the Hack’, Computing, 30th April.
-
(1998)
Computing
-
-
Smith, S.1
-
9
-
-
84993074014
-
Intrusion Detection Systems: Threats, Taxonomy, Tuning
-
Overill, R. E. (1998) ‘Intrusion Detection Systems: Threats, Taxonomy, Tuning’, Journal of Financial Crime, Vol. 6, No. 1, pp. 49–51.
-
(1998)
Journal of Financial Crime
, vol.6
, Issue.1
, pp. 49-51
-
-
Overill, R.E.1
-
10
-
-
0004145058
-
Insertion, Evasion and Denial of Service: Eluding Network Intrusion Detection
-
available at URL http://www.secnet.com/papers/
-
Ptacek, T. and Newsham, T. (1998) ‘Insertion, Evasion and Denial of Service: Eluding Network Intrusion Detection’, available at URL http://www.secnet.com/papers/
-
(1998)
-
-
Ptacek, T.1
Newsham, T.2
-
11
-
-
84992947539
-
The Secret War
-
20th June
-
Warren, P. (1996) ‘The Secret War’, Computing, 20th June.
-
(1996)
Computing
-
-
Warren, P.1
-
12
-
-
84992992155
-
Trends in Computer Crime
-
Overill, R. E. (1998) ‘Trends in Computer Crime’, Journal of Financial Crime, Vol. 6, No. 2, pp. 157—162.
-
(1998)
Journal of Financial Crime
, vol.6
, Issue.2
, pp. 157-162
-
-
Overill, R.E.1
-
13
-
-
84993027952
-
Return of the Hack
-
Smith ‘Return of the Hack’
-
-
-
Smith1
|