www.eprace.edu.pl » omijanie-zapor-sieciowych » Bibliografia

Bibliografia

  1. Building Internet Firewalls, autorzy: E. Zwicky, Simon Cooper, D. Chapman,
    wydawnictwo O’Reilly;

  2. Vademecum Teleinformatyka, str. 226, wydanie drugie, opracowanie Networld, Warszawa 1999 r.;

  3. Maximum Security: A Hacker’s Guide to Protecting Your Internet Site and Network, 2nd Edition, autor anonimowy, polski przekład: Robomatic s.c., Wrocław 1998 r.;

  4. Router Security, (http://www.softpanorama.org/Security/network_securi-ty.shtml);

  5. VCCS Security Guidelines for Edge Devices, Virginia Community College System, (http://helpnet.vccs.edu/NOC/Network/SecurityGuidelinesv2.11.doc);

  6. Securing Low-End Cisco Routers, autor: Spender, 2003,(http://packetstorm.li-
    nuxsecurity.com/cisco/cisco.txt);

  7. How do I secure a Cisco router from the Internet?, Cisco Forum FAQ 40.0 Security, (http://www.broadbandreports.com/faq/7766);

  8. Improving Security on Cisco Routers, Cisco Systems,(http://www.cisco.com
    /warp/public/707/21.html);

  9. Router Security Configuration Guide (część I i II) National Security Agency,

(http://nsa2.www.conxion.com/cisco/guides/cis-1.pdf),

(http://nsa2.www.conxion.com/cisco/guides/cis-2.pdf);

  1. Projektowanie bezpiecznej konfiguracji sieci, autor: Tomasz Kruk, 2004, (www.ia.pw.edu.pl/~tkruk/latex/t2.pdf);

  2. Cisco: pierwsze produkty NAC, Networld (http://www.idg.pl/news/
    68182/100.html);

  3. Bezpieczeństwo routerów Cisco, autor: Waldemar Pierścionek, PCkurier, 19/2001,(http://www.pckurier.pl/archiwum/artykuly/pierscionek_waldemar/2001_19_74);

  4. Penetration Testing IPsec VPNs, autorzy: Rohyt Belani, K. K. Mookhey (http://www.securityfocus.com/infocus/1821);

  5. Exploiting Cisco Routers: Part 1, autor: Mark Wolfgang, 2003, (http://www.securityfocus.com/infocus/1734);

  6. Exploiting Cisco Routers: Part 2, autor: Mark Wolfgang, 2003, (http://www.securityfocus.com/infocus/1749);

  7. Cisco IOS z punktu widzenia intruza, autor: Kamil Folga, Hackin9, 6/2004;

  8. Zło czai się w tunelu¸ autor: Patryk Królikowski, Networld, 3/2007;

  9. Zdalne rozpoznawanie systemów operacyjnych, autor: Łukasz Nowicki, Hackin9, 5/2003;

  10. Wardriving pieszo i samochodem, autor: Patryk Królikowski, Networld, 5/2007;

  11. Bypassing firewalls with tunnels, autor: Martin Ferretti, 2005, (http://www.tipmonki-es.com/2005/08/08/bypassing-firewalls-with-tunnels);

  12. Stealing the network: how to own the box¸ autorzy: Ryan Russel, Tim Mullen, Dan Kaminsky, Syngress, Black Hat Inc., 2003;

  13. Firewall Penetration Testing, autor: Mount Arrarat Blossom, 2000, (http://wittys.com/files/mab/fwpentesting.html);

  14. Punching holes into firewalls, autor: anonimowy, 2007, (http://sebsauvage.net
    /punching/);

  15. SSH Tunnels: Bypass (almost) any firewall, autor: pazkooda, 2006, (http://polishlinux.org/apps/ssh-tunneling-to-bypass-corporate-firewalls);

  16. Wardriving w praktyce, autor: Michał Szymański, Hackin9, 3/2003;

  17. Demystifying Penetration Testing¸ autor: Debasis Mohanty, (http://www.info-secwriters.com/text_resources/pdf/pen_test2.pdf);

  18. Hacking Through Firewalls, autor: Paul Troncone, Penetration Testing Security Focus Group, (http://sfs.poly.edu/presentations/PaulT_firewalls.pdf);

  19. How to Bypass Most Firewall Restrictions and Access the Internet Privately aka The Surf At Work Page, autor: anonimowy, 2006, (http://www.buzz
    surf.com/surfatwork/);

  20. Hacking Exposed, Fifth Edition, (rozdział 9 - Hacking Firewalls), autorzy: Stuart McClure, Joel Scambray, George Kurtz, 2005;

  21. Techniques used for bypassing firewall systems, autor: Adam Gowdiak, Pol34CERT, 2003, (http://www.terena.nl/activities/tf-csirt/meeting9/gowdiak-bypassing-firewalls.pdf);

  22. Bypassing firewall, autor: Ricky Lou, Zecure Lab Limited, 2005, (www.pisa.org.hk/event/bypassfw.pdf);

  23. The enemy Within: Firewalls and Backdoors, autorzy: BobRudin, Phil Kostenbader, 2003, (http://www.securityfocus.com/infocus/1701);

  24. Hacking Exposed Cisco Networks: Cisco Security Secrets & Solutions, autorzy: by Andrew A. Vladimirov, Konstantin V. Gavrilenko, Janis N. Vizulis and Andrei A. Mikhailovsky, McGraw-Hill/Osborne, 2006;

komentarze

Copyright © 2008-2010 EPrace oraz autorzy prac.