KNOW MORE

TEXTS

SECURITY NEWS

 

REPORTS

Orange Book
Department Of Defense Trusted Computer System Evaluation Criteria

Green Book
Department Of Defense Trusted Computer System Evaluation Criteria

Yellow Book
Department Of Defense Trusted Computer System Evaluation Criteria

  Overview: Attack Trends - CERT

Intelligence Analysis for Internet Secuiry - CERT

An Analysis of Using Reflectors for Distributed Denial-of-Service Attacks - Vern Paxon

 

PAPERS

LINKS

LINUX

Buffer Overflows Part I - IBM

Buffer Overflows Part II - IBM

Buffer Overflows Part III - IBM

Buffer Overflows Part IV - IBM

Secure CGI Programming - IBM

Access Control: Principles and Practice

Secure Email - IBM

Understanding PGP - CERT

Yahoo - Hackers, Crackers and Internet Attacks

2600 - The Hacker Quaterly

SecurityFocus Online

CERT Coordination Center

Getting Started Guide: Redhat Linux 7.2

Customization Guide: Redhat Linux 7.2

Reference Guide: Redhat Linux 7.2