Zur Person
Größere Projekte
IT Incident Response
Publikationen
PGP-Schlüssel
Impressum
|
Literaturverzeichnis [Needham, Schroeder 1978] bis [Stoll 1989]
- [Needham, Schroeder 1978] Using encryption for authentication in large
networks of computers / Needham, R. M.; Schroeder, M. D. - In: Communications
of the ACM. - Vol. 21, Nr. 12, Dezember 1978, S. 993-999.
- [Nelson et al. 1990] Mutual Suspicion for Network Security / Nelson, R.;
Becker, D.; Brunell, J.; Heimann, J. - In: 13. National Computer Security
Conference. - Gaithersburg, Md.: US National Institute of Standards and
Technology, 1990. - S. 228-236.
- [Neumann 1989] The Unix Internet Worm and Software Engineering / Neumann,
P. G. - In: ACM SIGSOFT Software Engineering Notes. - Vol. 14, Nr. 1, Januar
1989, S. 5-6.
- [Neumann 1990] Robert T. Morris convicted / Neumann, P. G. - In: ACM
SIGSOFT Software Engineering Notes. - Vol. 15, Nr. 2, April 1990, S. 19.
- [Neumann 1990a] Robert T. Morris' sentencing and its implications /
Neumann, P. G. - In: ACM SIGSOFT Software Engineering Notes. - Vol. 15, Nr. 3,
Juli 1990, S. 11-12.
- [Neumann 1991] Internet Worm appeal fails / Neumann, P. G. - In: ACM
SIGSOFT Software Engineering Notes. - Vol. 16, Nr. 2, April 1991, S. 16.
- [NYT 1.02.1989] U.S. Officials Weigh Plea Bargain in Case Of Computer
Virus / . - In: The New York Times. - Vol. 138, 1. Februar 1989, S. I,16:4.
- [NYT 10.01.1990] Computer Chaos Called Mistake, Not Felony / . - In: The
New York Times. - Vol. 139, Nr. 48111, 10. Januar 1990, S. I,16:2.
- [NYT 15.01.1990] Computer Stunt Helped Security, Witness Says / . - In:
The New York Times. - Vol. 139, Nr. 48116, 15. Januar 1990, S. I,14:2.
- [Oberman 1989] Report on the W.COM worm / Oberman, R. K. - 16. Oktober
1989. - [enthalten in [CERT 04/1989], [DDN SEC 03/1989] und [CIAC A-2 1989]].
- [Parker 1990] Computer-related Crime: Ethical Considerations : (With
Applications for teaching Computer Literacy Classes) / Parker, R. - In:
Computers and Society. - Vol. 20, Nr. 3, 1990, S. 180-191.
- [Pethia, van Wyk] Computer Emergency Response : An International Problem
/ Pethia, R. D.; van Wyk, K. R. - Carnegie Mellon University. - Pittsburgh,
PA.
- [Pfitzmann 1990] Entwicklungslinien der Informationstechnik und
Informatik und ihre Auswirkungen auf rechtliche Beherrschung / Pfitzmann, A.
- In: Datenschutz und Datensicherung. - Vol. 14, Nr. 12, Dezember 1990,
S. 620-627.
- [Pfleeger 1990] Security in Computing / Pfleeger, C. P. - New York, NY:
Prentice Hall, 1990.
- [Quisquater, Desmedt 1991] Chinese Lotto as an Exhaustive Code-Breaking
Machine / Quisquater, J.-J.; Desmedt, Y. G. - In: Computer. - Vol. 24, Nr. 11,
November 1991, S. 14-22.
- [Rannenberg 1992] Evaluation, Zertifizierung, Akkreditierung /
Rannenberg, K. - In: Datenschutz und Datensicherung. - Vol. 16, Nr. 5, Mai
1992, S. 250-251.
- [Reynolds 1989] The Helminthiasis of the Internet / Reynolds, J. Network
Working Group. - RFC 1135 vom Dezember 1989.
- [Rihaczek 1990] Die harmonisierten Evaluationskriterien für
IT-Systeme / Rihaczek, K. - In: Datenschutz und Datensicherung. - Vol. 14,
Nr. 12, Dezember 1990, S. 628-634.
- [Rihaczek 1990a] Ist nur die Unsicherheit sicher? / Rihaczek, K. - In:
Datenschutz und Datensicherung. - Vol. 14, Nr. 2, Februar 1990, S. 57.
- [Rihaczek 1990b] Netze und Unsicherheit / Rihaczek, K. - In: Datenschutz
und Datensicherung. - Vol. 14, Nr. 6, Juni 1990, S. 285.
- [Rochester, Gantz 1984] Der nackte Computer : Für Laien und
Fachleute, Kritiker und Enthusiasten / Rochester, J. B.; Gantz, J. -
Köln: DuMont, 1984.
- [Rochlis, Eichin 1989] With Microscope and Tweezers : The Worm from MIT's
Perspective / Rochlis, J. A.; Eichin, M. W. - In: Communications of the ACM.
- Vol. 32, Nr. 6, Juni 1989, S. 689-698.
- [Rotenberg 1990] Prepared Testimony and Statement for the Record on
Computer Virus Legislation / Rotenberg, M. - In: Computers and Society. -
Vol. 20, Nr. 1, März 1990, S. 12-25.
- [Saffo 1989] Consensual Realities in Cyberspace / Saffo, P. - In:
Communications of the ACM. - Vol. 32, Nr. 6, Juni 1989, S. 664-665.
- [Saltzer 1989] Teaching Students About Responsible Use of Computers /
Saltzer, J. H. - In: Communications of the ACM. - Vol. 32, Nr. 6, Juni 1989,
S. 704.
- [Scherlis et al. 1990] Computer Emergency Response / Scherlis, W. L.;
Squires, S. L.; Pethia, R. D. - In: Computers Under Attack / Hrsg. v. Denning,
P. J. - Reading, Mass.: Addison-Wesley, 1990. - S. 495-504.
- [Schneider 1989] Juristische Aspekte der Softwaremanipulation /
Schneider, M. - In: Manipulation in Rechnern und Netzen / Hrsg. v.
Gleißner, W.; Grimm, R.; Herda, S.; Isselhorst, H. - Bonn:
Addison-Wesley, 1989. - S. 277-282.
- [Schultz et al. 1990] Computer Emergency Response Teams : Lessons Learned
/ Schultz, E. E.; Pethia, R. D.; Dalton, J. R. - In: 13. National Computer
Security Conference. - Gaithersburg, Md.: US National Institute of Standards
and Technology, 1990. - S. 634-640.
- [Seeley 1989] Password Cracking : A Game of Wits / Seeley, D. - In:
Communications of the ACM. - Vol. 32, Nr. 6, Juni 1989, S. 700-703.
- [Shoch, Hupp 1982] The Worm Programs : early Experience with a
Distributed Computation / Shoch, J. F.; Hupp, J. A. - In: Communications of
the ACM. - Vol. 25, Nr. 3, März 1982, S. 172-180.
- [Shore 1988] Why I never met a programmer I could trust / Shore, J. - In:
Communications of the ACM. - Vol. 31, Nr. 4, April 1988, S. 372-375.
- [Sims 1988] Researchers Fear Computer 'Virus' Will Slow Use of National
Network / Sims, C. - In: The New York Times. - Vol. 138, 14. November 1988,
S. II,6:1.
- [Sinisi 1989] Network Security Issues / Sinisi, M. J. - University of
Colorada Master Thesis. - 1989.
- [Smith 1988] A Survey of Process Migration Mechanisms / Smith, J. M. -
In: ACM SIGOPS Operating Systems Review. - Vol. 22, Nr. 3, Juli 1988,
S. 28-40.
|