NT Security - FAQ v0.41 - Although somewhat dated, this FAQ contains some excellent information and should be read by anybody getting into NT administration.
53a29668fbb0f820ae256c3159c774ee7d877cb326d48ae4d7b6bac526bd019b
"Incremental Information Integrity" - An interesting paper that rationalizes network security by dividing network information into four categories and then assigning each layer/category a part in a traditional hacking scenario.
623c64467036465e33e44495a405432bb251e019b4d7f9b45e1f54b81dad2dd1
"Secure Deletion of Data from Magnetic and Solid-State Memory" - This whitepaper describes some of the methods available to recover erased data and presents schemes to make this recovery significantly more difficult.
56e0ffc15603b1fe830c68ceefb8148a3ccc647d46d7ef7a8221c73095babc6f
No information is available for this file.
3b4758d77975259d295fbc5816c9a976ad0f50fd444e40f7231913b9eb7e3628
The Solaris Security FAQ - Excellent Solaris Security papeer that covers many of the basics, and serves as a good standard reference for securing Solaris installations.
78306d59fd1f24020075b3b39591c3f46cfe49ff8bb20348a82a9b1e89902fd5
"Tools of the Trade" - "So you want to defend your enterprise against attack? Make sure you understand these popular hacker tools first."
1332ef355b26b544b1a969de769487e8a9e39e95f67ecc382083d67c2c52de9b
When Computers are Weapons: Information Warfare and the Security Dilemma" - The title of this essay sums up the content - a very thought-provoking read from the latest issue of Georgetown Essays on Information Warfare, which is edited by Dorothy Denning.
9f8cecee7b732dcd0018ec1f3abc70b56874b9caaaece1ad2fbcd3914554d6c3
1991-04-16 Summary of the Trusted Information Systems (TIS) Report on Intrusion Detection Systems
19413a68af48a59badc7f1c5e05b723c779be1d0727cbb7a5fbfd57fbb2899d5
No information is available for this file.
32badbb376af1bab84952cae5b76074d9724d8f5e961b29dcfa563ab75f83dd5
ICSA: "International Computer Security Association" or "International Crime Syndicate Association"?
773ec4108864d69209b3012b510b3ade2afa4de94bf6987dde0d8ce9f7ad3229
19 Infosecurity Predictions For '99.
733ee8c37c02229b561d9251c871b1ef962068ddedc30a2ac5394cd3abfae792
1992-11-08 Potential Liabilities of Computer Security Response Centers
3e6d58efc67dd5c9663d74fc5959d67e4aed6cc8cfa31ef99181d18f704e2dad
Subversion: The Neglected Aspect of Computer Seccurity - Excellent thesis by Philip A. Myers written in June, 1980. InfoSec white paper that is still of great value today. He got his BS at NC State University, btw (where I'm currently enrolled).
ffca0ddd54ce020625a6b87ac13220a9fa7eec3cf7100a9cf33a28084db01341
1990-06-06 Eavesdropping on the electronic emanations of digital equipment, by C. Seline
74cecca0e78151f4c0a17e292f4c7f7c547d7cd3cbfcdeef4ac6a1c9b0f2b57b
1993-02-26 Foundations for the Harmonization ofInformation Technology Security Standards
aa716e8462f1186a03f9a42cb2ca1dad7a97dd21fb332b2b96eea0e56f5ba852
1992-12-07 "The COPS Security Checker System"
79fdf8758d6c40f680946c446e094038d670b315811e836c394ba44598e3617c
1992-12-07 "Are Cmputer Hacker Break-ins Ethical"Eugene H. Spafford, Purdue
6424ef6d0f3270fb0e8d3c4ce309f69a6932ca8adf7d95a9458b68139e7d6df7
1995-12-19 AUSCERT UNIX Computer Security Checklist (Version 1.1)
ba663874a112c5fb30101b4bcc3702f4814775109d3f52cbc6255bbad9d352e3
1992-12-08 "Limitations of the Kerberos Authentication System" Steven M. Bellovin & Michael Merrit, AT&T Bell Labs
7600aaf625d22ca09b5074a7ce5d0504da19e0122eb1c3d7b172b4475dc8adb1
1994-03-01 ID & analysis of foreign laws & regs. pertaining to the use of commercial encryption products for voice and data communications
d2d90d375988d8b174942ddfde3b2e5809cdb574e282a3e6bc5c1fe6fe3dfd8f
1994-03-01 review and analysis of U.S. Laws, reg.& case laws pertaining to the use of commercial encryption products for voice and data communications
0846e1fc4eefd4672569a8435021a68c1d213731142165ee5004dbd4c7e64a17
1993-11-10 National Computer Security Center "Endorsed Tools List"
517856156b93697a5f3a9d274273e4f59b346f831fe539c1882565750b10a981
1993-11-10 National Computer Security Center "A Guideline on Office Automation Security" 12/5/86
dc5e73209fd2a726fc7e5db195fada8c3e05d9fb5fb9449dd3264147ea3b1a7c
1992-12-08 "OARnet Security Procedures" Kannan Varadhan, OARnet
99e437342c5da869cf2326c86d76da2561d6e195fbd57ded284fe53a95df8863
1993-07-20 "Network (In)Security Through IP Packet Filtering" by Brent Chapman
05be1ac4256ef2316c39ff07e7067d5753fd39e114cf5b0a5f41e04755185659