Anterior Índice
Próxima
7. Bibliografia[1] Anderson, J. P.; Computer Security Threat Monitoring and Surveillance, James P. Anderson Co., Fort Washington, PA, abril de 1980. http://csrc.nist.gov/publications/history/ande80.pdf [2] Denning, D. E.; An Intrusion Detection Model, IEEE Transactions On Software Engineering, Vol. SE-13, No. 2, Fevereiro 1987, pp. 222-232. http://www.cs.georgetown.edu/~denning/infosec/ids-model.rtf [3] Heberlein, L. T., Dias, G. V., Levitt, K. N., Mukherjee B., Wood J., Wolber D.; A Network Security Monitor, Proceedings of the IEEE Computer Society Symposium, Research in Security and Privacy, Maio 1990, pp. 296-303. [4] Innella, P.; The Evolution of Intrusion Detection Systems; Tetrad Digital Integrity, LLC, Novembro de 2001. http://www.securityfocus.com/infocus/1514 [5] Innella, P.; An Introduction to Intrusion Detection Systems; Tetrad Digital Integrity, LLC, Dezembro de 2001. http://www.securityfocus.com/infocus/1520 [6] Elson, D.; Intrusion Detection, Theory and Practice; Março de 2000. http://www.securityfocus.com/infocus/1203 [7] Frederick, K. K.; Network Intrusion Detection
Signatures - A Five-Part Series; Dezembro de 2001. http://www.securityfocus.com/infocus/1524 [8] Miller, T.; Intelligence Gathering: Watching a Honeypot at Work, Janeiro de 2003. http://www.securityfocus.com/infocus/1656 [9] Spitzner, L..; The Value Of Honeypots, Part One: Definitions and Values of Honeypots, Outubro de 2001. http://www.securityfocus.com/infocus/1492
|