exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 76 - 100 of 188 RSS Feed

Files

primer.ps
Posted Aug 17, 1999

1992-12-07 "Coping with the Threat of Computer Security Incidents-A Primer from Prevention through Recovery" Russell L. Brand"

tags | paper
SHA-256 | f790806a0b8ed078cfa1b5b9379dadb0ba3769539df4f2810bb1b06e098298dc
rfc1281.ps
Posted Aug 17, 1999

1992-12-07 "Guidelines for the Secure Operation of the Internet" R. Pethia, CERT, S.Crocker, TIS, and B. Fraser, CERT

tags | paper
SHA-256 | 3beef5292eefb6fa5616290c221aaace136190d4a26b5ceb195194230af51412
faq-k.ps
Posted Aug 17, 1999

1992-12-08 "Answers to Frequently Asked Questions About Today's Cryptography" Paul Fahn, RSA Laboratories

tags | paper
SHA-256 | 4d1e485a9433b72e688c8448519a6ee5c1f78dedeb91d236004f56468d7936f1
faq-sec.txt
Posted Aug 17, 1999

1993-02-10 Frequently asked questions on the USENET News groups, "comp.security.misc" and "alt.security"

tags | paper
SHA-256 | 15247d4b27063423c90047d85e2f0d0990afe4fe68228bdf4bfa44835882cacc
fedeli.txt
Posted Aug 17, 1999

1993-03-18 Organizing a Corporate Anti-Virus Program

tags | paper, virus
SHA-256 | 755ebe861aa018ae92b8327f5dc9a9fd1386e48071ec68bdc5516f6c2f8c58b0
form-irt.ps
Posted Aug 17, 1999

1994-10-18 Forming an Incident Response Team - Danny Smith, Austrlian SERT

tags | paper
SHA-256 | c8fff2d10900e1096fc99200510564a1a1bb4299f53b8df6679417e3acb2dbd0
fwalls.ps
Posted Aug 17, 1999

1993-07-20 "Thinking About Firewalls" by Marcus Ranum

tags | paper
SHA-256 | a2fbd0a3c2c6ea92d8a77701357cf5296f6ee83f39b717df3310469a23442821
gateway.ps
Posted Aug 17, 1999

1992-12-04 "The Design of a Secure Internet Gateway"

tags | paper
SHA-256 | f9b5104de8210146f3c409e1a05a6a4a42b9df29e872f67f23e5bf1a8f846114
guidance.txt
Posted Aug 17, 1999

1985-12-01 Suggested Actions & Proc. for Software Maintenance

tags | paper
SHA-256 | c609a91befc342ab2edc7f52c9bb0ee5533dd798c09288c67e1eb615924c579c
hacker.txt
Posted Aug 17, 1999

1990-06-04 The social organization of the computer underground, Thesis, G. Meyer, Illinois

tags | paper
SHA-256 | 4fd2e91cee2a52e8450fe85c8c799eea3c0ec7fc9465f1f28d881967fee92d90
hansen.txt
Posted Aug 17, 1999

1993-03-18 Legal Issues - A Site Manager's Nightmare

tags | paper
SHA-256 | fc9d456a9c27d265b6fb1029880e36ebffd26aed61540379405fbffc6503cdbe
ipext.ps
Posted Aug 17, 1999

1993-07-20 "Security Problems in the TCP/IP Protocol Suite" by Steve Bellovin"

tags | paper, tcp, protocol
SHA-256 | 92659f3365f8178c6bbca579bc80f1380b47a7e5c5bd0f8e50ff5dddffab1ced
itsec.txt
Posted Aug 17, 1999

1994-06-06 information technology security evaluation criteria

tags | paper
SHA-256 | 560bb0ecd66b95fd2bc706213b338dc0f523c61c39297d7a47bac8c06c06161b
jscrprt.txt
Posted Aug 17, 1999

1994-04-15 Redefining Security "A Report to the Secretary of Defense and the Dir. of Central Intelligence"

tags | paper
SHA-256 | 3f0747fdda7c066268ed4757ef970bf14bcce8d5632c1995bbfec49e9cc3a708
dlvr2.ps
Posted Aug 17, 1999

1993-03-18 Relating Functionality Class and Security Sub-profile Specifications

tags | paper
SHA-256 | 32934feae946346122073bfa2a294dad7cde9eacf325a6bc42aaa46075520f18
doc-cert.txt
Posted Aug 17, 1999

1993-11-23 Department of Commerce's Abbreviated Certification Methodology Guidelines for Sensitive and Classified IT Systems

tags | paper
SHA-256 | ea0f29ee674717698c7be442a8108bf73d9a597cbb71857e61971876204fff9a
dragon.ps
Posted Aug 17, 1999

1992-12-04 "There Be Dragons" by Steven M. Bellovin-a description of cracker assults vs. the ramparts of ATT.COM

tags | paper
SHA-256 | 9ad48dc135e2c7a5f15789b4a48f635d698d20460c387a935970b6b9e642f159
berferd.ps
Posted Aug 17, 1999

1992-12-07 "An Evening with Berferd In Which a Cracker is Lured, Endured, and Studied" Bill Cheswick, AT&T Bell Labs

tags | paper
SHA-256 | de8f6319fb176bb435c681d6a603cd498096882447ab49eb438b5573e5b5d93c
certresp.ps
Posted Aug 17, 1999

1992-12-07 "Computer Emergency Response-An Int'l Problem" a description of the CERT System" Richard D. Pethia

tags | paper
SHA-256 | 09d5ae9bdc10dbb998cfe0aebdafabb8edf7533dc0e2ed31af8b545319eff50a
cslaw.txt
Posted Aug 17, 1999

1990-07-17 "Computer Security and the Law." by Gary Morris - good doc on legal issues with regard to computer security

tags | paper
SHA-256 | 5c33f14973086fcee9e932bbdf16fa6a52dc777f027c4ed55129ae149adf5967
curry.ps
Posted Aug 17, 1999

1992-12-07 "Improving the Security of your Unix System" David A. Curry, SRI International

tags | paper
systems | unix
SHA-256 | 3b93175fc0bd5513cf94f32b97f6c6f3a2d5d8e2ad6adfbf91396d9eb11ec0bc
degausse.txt
Posted Aug 17, 1999

1993-11-10 National Computer Security Center "Degausser Products List" 2/27/89

tags | paper
SHA-256 | 10351f159c71aecc2269477648a9b2050a6d3ccef99fc4c953a8cd72b9aac801
dlvr1.ps
Posted Aug 17, 1999

1993-04-21 Foundation for the Harmonization of Information Technology

tags | paper
SHA-256 | 4d627d6e0153c6b09f254340b935919b85cf9260db677c9cc3c34eb959983f9f
ais_plcy.wp6
Posted Aug 17, 1999

U.S. Customs AIS Security Policy Manual CIS HB 1400-05 (WordPerfect 6.1), June 1996

tags | paper
SHA-256 | 6abdafa684197800463f1c3617185be0f47721a10f8c017228842d51d1f92313
ais-doc.htm
Posted Aug 17, 1999

U.S. Customs Security Policy: Automated Information Systems Security Policy, Febraury 1996

tags | paper
SHA-256 | e36ea3392a1be2240549286da87eb3acb57a76100159b773fbae84b1369abd62
Page 4 of 8
Back23456Next

Top Authors In Last 30 Days

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close