╧≡ΦδεµσφΦσ 1. ╚φ⌠ε≡∞α÷Φεφφ√σ ≡σ±≤≡±√ ∩ε ßστε∩α±φε±≥Φ Γ ╚φ≥σ≡φσ≥σ

1.1. Web-±αΘ≥√

└≡⌡ΦΓ ∩ε Ωε∞∩ⁿ■≥σ≡φεΘ ßστε∩α±φε±≥Φ ∩≡εσΩ≥α COAST
http://www.cs.purdue.edu/coast/coast.html

▌≥ε ⌡ε≡ε°σσ ∞σ±≥ε, πΣσ ∞εµφε φαΘ≥Φ ±≡σΣ±≥Γα ßστε∩α±φε±≥Φ, ≥αΩΦσ ΩαΩ COPS, Tripwire, SATAN Φ ≥.Σ. ┬√ ∞εµσ≥σ ß√≥ⁿ ≤Γσ≡σφ√, ≈≥ε Φ±⌡εΣφ√σ ≥σΩ±≥√ φσ ±εΣσ≡µα≥ ∩≡επ≡α∞∞φ√⌡ ταΩδαΣεΩ, α Γσß-Φφ≥σ≡⌠σΘ± ∩ε∞εµσ≥ Γα∞ φαΘ≥Φ ≥ε, ≈≥ε Γ√ ⌡ε≥Φ≥σ. ╥α∞ µσ σ±≥ⁿ ∞φεπε Φφ≥σ≡σ±φ√⌡ ±≥α≥σΘ.

╤∩Φ±εΩ ±±√δεΩ ╤∩α⌠⌠ε≡Σα
http://www.cs.purdue.edu/homes/spaf/hotlists/csec.html

╤∩Φ±εΩ ±±√δεΩ ∩ε Ωε∞∩ⁿ■≥σ≡φεΘ ßστε∩α±φε±≥Φ ▐. ╤∩α⌠⌠ε≡Σα

┬σß-±αΘ≥ ∩ε ßστε∩α±φε±≥Φ π≡≤∩∩√ CIAC
http://ciac.llnl.gov/

╤αΘ≥ π≡≤∩∩√ εßσ±∩σ≈σφΦ  ßστε∩α±φε±≥Φ Γ ╦ΦΓσ≡∞ε≡±ΩεΘ δαßε≡α≥ε≡ΦΦ Σδ  ∩≡αΓΦ≥σδⁿ±≥Γσφφ√⌡ Φ Γεσφφ√⌡ ±αΘ≥εΓ. ╬φΦ Γ√∩≤±Ωα■≥ ±εεß∙σφΦ  ε ≤ τΓΦ∞√⌡ ∞σ±≥α⌡ αφαδεπΦ≈φ√σ ±εεß∙σφΦ ∞ CERT. ╚∞σσ≥±  ∞φεπε ∩≡επ≡α∞∞φ√⌡ ±≡σΣ±≥Γ, φε ≈α±≥ⁿ Φτ φΦ⌡ Σε±≥≤∩φα ≥εδⁿΩε Σδ  Γεσφφ√⌡ ±αΘ≥εΓ.

╚φ⌠ε≡∞α÷Φεφφ√σ ±≥≡αφΦ÷√ AUSCERT
http://www.auscert.org.au/

AUSCERT - ²≥ε αΓ±≥≡αδΦΘ±Ωα  π≡≤∩∩α CERT. ╙ φΦ⌡ σ±≥ⁿ ≡ Σ ±≡σΣ±≥Γ Φ ±≥α≥σΘ, Ωε≥ε≡√⌡ φσδⁿτ  φαΘ≥Φ φα Σ≡≤πΦ⌡, α∞σ≡ΦΩαφ±ΩΦ⌡ ±αΘ≥α⌡, ΓΩδ■≈α  ⌡ε≡ε°≤■ ±≥α≥ⁿ■ ∩ε ≡ατ≡αßε≥Ωσ ∩εδΦ≥ΦΩΦ ßστε∩α±φε±≥Φ Φ ΩφΦπ≤ ∩ε ßστε∩α±φε±≥Φ ε≥Ω≡√≥√⌡ ±Φ±≥σ∞.

8lgm: ±εεß∙σφΦ  ∩≡ε ≤ τΓΦ∞√σ ∞σ±≥α
http://www.8lgm.org

"Eight Little Green Men" (ΦδΦ "Eight-Legged Groove Machine"?) - ²≥ε π≡≤∩∩α ²φ≥≤τΦα±≥εΓ Ωε∞∩ⁿ■≥σ≡φεΘ ßστε∩α±φε±≥Φ, Ωε≥ε≡α  ∩≤ßδΦΩ≤σ≥ ±ΓεΦ ±εß±≥Γσφφ√σ ±εεß∙σφΦ  εß εßφα≡≤µσφφ√⌡ ≤ τΓΦ∞√⌡ ∞σ±≥α⌡ Φ ε°ΦßΩα⌡ Γ ∩≡επ≡α∞∞α⌡. ╧ε∞Φ∞ε Γσß±αΘ≥α εφΦ ∩εΣΣσ≡µΦΓα■≥ ±∩Φ±εΩ ≡α±±√δΩΦ.

╩ε≡∩ε≡α÷Φ  Telstra: ΦφΣσΩ± ±±√δεΩ ∩ε Ωε∞∩ⁿ■≥σ≡φεΘ Φ ±σ≥σΓεΘ ßστε∩α±φε±≥Φ
http://www.telstra.com.au/info/security.html

╨σ±≤≡±√ NIST ∩ε Ωε∞∩ⁿ■≥σ≡φεΘ ßστε∩α±φε±≥Φ
http://csrc.nist.gov/

┬σß±αΘ≥ ═αΘΦεφαδⁿφεπε ╚φ±≥Φ≥≤≥α ∩ε ╤≥αφΣα≡≥α∞ Φ ╥σ⌡φεδεπΦ ∞. ▌≥ε≥ ±αΘ≥ ±εΣσ≡µΦ≥ Φφ⌠ε≡∞α÷Φ■ ∩ε ±≥αφΣα≡≥α∞ DES Φ φεΓ√∞ ±≥αφΣα≡≥α∞ ∩ε ≤±ΦδσφφεΘ Ω≡Φ∩≥επ≡α⌠ΦΦ, ∩≡εσΩ≥σ Φφ⌠≡α±≥≡≤Ω≥≤≡√ Σδ  ≡α±∩≡ε±≥≡αφσφΦ  ε≥Ω≡√≥√⌡ Ωδ■≈σΘ, Φ ∩≤ßδΦΩα÷Φ ∞ ∩ε Ωε∞∩ⁿ■≥σ≡φεΘ ßστε∩α±φε±≥Φ.

╦αßε≡α≥ε≡Φ  Φ±±δσΣεΓαφΦΘ ∩ε Ωε∞∩ⁿ■≥σ≡φεΘ ßστε∩α±φε±≥Φ Γ ΩαδΦ⌠ε≡φΦΘ±Ωε∞ ≤φΦΓσ≡±Φ≥σ≥σ Γ ─²ΓΦ±σ
http://seclab.cs.ucdavis.edu/Security.html

╚φ⌠ε≡∞α÷Φ  ε ΓσΣ≤∙Φ⌡±  Φ±±δσΣεΓα≥σδⁿ±ΩΦ⌡ ∩≡εσΩ≥α⌡ Γ εßδα±≥Φ α≤ΣΦ≡εΓαφΦ  Φ εßφα≡≤µσφΦ  Γ≥ε≡µσφΦ .

╓σφ≥≡ Φ±±δσΣεΓαφΦΘ ∩ε Ωε∞∩ⁿ■≥σ≡φεΘ ßστε∩α±φε±≥Φ Γ ╦εφΣεφ±ΩεΘ ▌Ωεφε∞Φ≈σ±ΩεΘ ╪Ωεδσ
http://csrc.lse.ac.uk/csrc/csrchome.htm

╧εδΦ≥ΦΩα ßστε∩α±φε±≥Φ Institute for Computer and Telecommunications Systems
http://www.seas.gwu.edu:80/seas/ictsp/

╚φ⌠ε≡∞α÷Φ  ε ■≡ΦΣΦ≈σ±ΩΦ⌡ Γε∩≡ε±α⌡ Ωε∞∩ⁿ■≥σ≡φεΘ ßστε∩α±φε±≥Φ

┬ε∩≡ε±√ ßστε∩α±φε±≥Φ Γ WWW
FAQ ∩ε ßστε∩. Γ WWW http://www-genome.wi.mit.edu/WWW/faqs/www-security-faq.html
╙φ. ╨≤≥πσ≡±αhttp://www-ns.rutgers.edu/www-security/index.html
HotJavahttp://java.sun.com/1.0alpha3/doc/security/security.html
╧≡εßδσ∞√ ± C2http://www.c2.org/hacknetscape/
┴στε∩α±φε±≥ⁿ CGIhttp://www.cerf.net/~paulp/cgi-security
╬ß∙. Γε∩≡. WWW http://www.boutell.com/faq
FAQ ∩ε CGIhttp://www.best.com/~hedlund/cgi-faq

╤αΘ≥√ ∩≡εΦτΓεΣΦ≥σδσΘ ∞α≡°≡≤≥Φτα≥ε≡εΓ
http://www.cisco.com
http://www.livingston.com
http://www.baynetworks.com
http://www.network.com
http://www.racal.com/networking.html

╤αΘ≥√ ∩≡εΦτΓεΣΦ≥σδσΘ ß≡αφΣ∞α≤²≡εΓ, ε≥±ε≡≥Φ≡εΓαφφ√σ ∩ε Φ∞σφΦ ∩≡εΦτΓεΣΦ≥σδ 
Gauntlethttp://www.tis.com
NetSPhttp://www.ibmlink.ibm.com/oi/ann/alet/294774.html
Sidewinderhttp://www.sctc.com
Borderwarehttp://www.border.com
Firewall-1http://www.checkpoint.com
DEC SEALhttp://www.digital.com
Centrihttp://www.cohesive.com
PORTUShttp://www.sccsi.com/lsli/lsli.homepage.html
Eaglehttp://www.raptor.com
Black Holehttp://www.milkyway.com
InterLockhttp://www.ans.net/security.html
NET1-AccessPlushttp://www.iu.net/n1/
Ascendhttp://www.ascend.com

1.2. Ftp-±αΘ≥√

ftp.cisco.com╚φ⌠ε≡∞α÷Φ  ε ∩≡εΣ≤Ω≥α⌡ Cisco, ∩≡Φ∞σ≡√ ∩≡αΓΦδ ⌠Φδⁿ≥≡α÷ΦΦ Φ ≥.Σ.
rtfm.mit.edu└≡⌡ΦΓ√ FAQ π≡≤∩∩ ≥σδσΩεφ⌠σ≡σφ÷ΦΘ USENET Γ ╠╥╚
ftp.greatcircle.com╚φ⌠ε≡∞α÷Φ  ε ß≡αφΣ∞α≤²≡α⌡
net.tamu.edu╤≡σΣ±≥Γα ßστε∩α±φε±≥Φ Φτ Texas A&M University (TAMU)
ftp.uu.net└≡⌡ΦΓ√ UUNET

1.3. ├≡≤∩∩√ φεΓε±≥σΘ

╩ε∞∩ⁿ■≥σ≡φα  ßστε∩α±φε±≥ⁿ
alt.security┬ε∩≡ε±√ ßστε∩α±φε±≥Φ Γ Ωε∞∩ⁿ■≥σ≡φ√⌡ ±Φ±≥σ∞α⌡
alt.security.index╙Ωατα≥σδΦ φα Φφ≥σ≡σ±φ√σ Γσ∙Φ Γ misc.security
comp.risks╨Φ±ΩΦ Σδ  εß∙σ±≥Γα ε≥ Ωε∞∩ⁿ■≥σ≡εΓ
comp.security.announce╤εεß∙σφΦ  Φτ CERT ε ßστε∩α±φε±≥Φ
comp.security.firewalls─Φ±Ω≤±±ΦΦ ∩ε ∩εΓεΣ≤ ß≡αφΣ∞α≤²≡εΓ
comp.security.misc┴στε∩α±φε±≥ⁿ Ωε∞∩ⁿ■≥σ≡εΓ Φ ±σ≥σΘ
comp.security.unix┴στε∩α±φε±≥ⁿ Γ Unix

╤σ≥σΓεΘ εß∞σφ ± ∩ε∞ε∙ⁿ■ TCP/IP :
comp.protocols.tcp-ip╧≡ε≥εΩεδ√ TCP Φ IP

Telecom:
comp.dcom.cellular
comp.dcom.telecom
comp.dcom.telecom.tech

╬ßε≡≤ΣεΓαφΦσ ΩεφΩ≡σ≥φ√⌡ ∩≡εΦτΓεΣΦ≥σδσΘ:
comp.dcom.sys.cisco
comp.dcom.sys.wellfleet

═εΓ√σ ΓΦΣ√ ∩σ≡σΣα≈Φ ∩αΩσ≥εΓ :
comp.dcom.frame-relay
comp.dcom.isdn
comp.dcom.cell-relay

1.4 ╤∩Φ±ΩΦ ≡α±±√δΩΦ

┴≡αφΣ∞α≤²≡√
└Σ≡σ± ≡σπΦ±≥≡α÷ΦΦ: ∩ε°δΦ≥σ ∩Φ±ⁿ∞ε majordomo@greatcircle.com, ±εΣσ≡αµ∙σσ ±≥≡εΩ≤ "subscribe firewalls user@host". ▌≥ε≥ ±∩Φ±εΩ ∞εΣσ≡Φ≡≤σ≥±  ┴≡σφ≥ε∞ ╫α∩∞σφε∞, ∩≡στΦΣσφ≥ε∞ Great Circle Associates.

Bugtraq
─δ  ΓΩδ■≈σφΦ  Γ ±∩Φ±εΩ ∩ε°δΦ≥σ ∩Φ±ⁿ∞ε ∩ε αΣ≡σ±≤ LISTSERV@NETSPACE.ORG Φ Γ ≥σδσ ±εεß∙σφΦ  (φσ Γ ±≥≡εΩσ ≥σ∞√ ∩Φ±ⁿ∞α) φα∩Φ°Φ≥σ:"SUBSCRIBE BUGTRAQ". ▌≥ε ±∩Φ±εΩ ∩ε ßστε∩α±φε±≥Φ, Γ Ωε≥ε≡ε∞ εß±≤µΣα■≥±  Γ±σ ≥σ⌡φΦ≈σ±ΩΦσ ∩εΣ≡εßφε±≥Φ ≤ τΓΦ∞√⌡ ∞σ±≥ Φ ΓσΣσ≥±  Aleph1@underground.org.

╨σΩε∞σφΣα÷ΦΦ CERT
└Σ≡σ± Σδ  ≡σπΦ±≥≡α÷ΦΦ: cert-advisory-request@cert.org

╤≡σΣ±≥Γα CERT
└Σ≡σ± ε≥≡αµα≥σδ : cert-tools@cert.org
└Σ≡σ± Σδ  ≡σπΦ±≥≡α÷ΦΦ: cert-tools-request@cert.org

Alert
└Σ≡σ± ε≥≡αµα≥σδ : alert@iss.net
└Σ≡σ± ≡σπΦ±≥≡α÷ΦΦ: request-alert@iss.net
▌≥ε≥ ±∩Φ±εΩ ∞εΣσ≡Φ≡≤σ≥±  ╩≡Φ±≥ε⌠σ≡ε∞ ╩δα≤±ε∞, ∩≡στΦΣσφ≥ε∞ Internet Security Systems, Inc

Best of Security
─δ  ΓΩδ■≈σφΦ  Γ ±∩Φ±εΩ ∩ε°δΦ≥σ ∩Φ±ⁿ∞ε ∩ε αΣ≡σ±≤ best-of-security-request@suburbia.net Φ ≤ΩαµΦ≥σ Γ ≥σδσ ±εεß∙σφΦ  "subscribe best-of-security". ▌≥ε≥ ±∩Φ±εΩ ∞εΣσ≡Φ≡≤σ≥±  ▐δΦαφε∞ └±±αφΣµσ∞.

1.5. ╩φΦπΦ

Practical Unix and Internet Security, 2nd Edition

Author Simson Garfinkel and Gene Spafford
Copyright Date 1996
ISBN 1-56592-148-8
Publisher O'Reilly & Associates, Inc.

Firewalls and Internet Security

Author William Cheswick and Steven Bellovin
Publisher Addison Wesley
Copyright Date 1994
ISBN 0-201-63357-4

Building Internet Firewalls

Author Brent Chapman & Elizabeth Zwicky
Publisher O'Reilly & Associates, Inc.
Copyright Date 1995
ISBN 1-56592-124-0

Actually Useful Internet Security Techniques

Author Larry Hughes
Publisher New Riders Press
Copyright Date Sep-95
ISBN 1-56205-508-9

Computer Crime: A Crimefighter's Handbook

Authors David Icove, Karl Seger and William VonStorch
Publisher O'Reilly & Associates, Inc.
Copyright Date 1995
ISBN 1-56592-086-4

Computer Security Basics

Authors Deborah Russell & G.T. Gangemi Sr.
Publisher O'Reilly & Associates, Inc.
Copyright Date 1991
ISBN 0-937175-71-4

Security in Computing

Author Charles P. Pfleeger
Publisher Prentice Hall
Copyright Date 1989
ISBN 0-13-798943-1.

Network Security: Private Communication in a Public World

AuthorsCharles Kaufman, Radia Perlman, and Michael Speciner
Publisher Prentice Hall
Copyright 1995
ISBN 0-13-061466-1

Unix System Security

Author Rik Farrow
Publisher Addison Wesley
Copyright Date 1991
ISBN 0-201-57030-0

Unix Security: A Practical Tutorial

Author N. Derek Arnold
Publisher McGraw Hill
Copyright Date 1993

Unix System Security: A Guide for Users and Systems Administrators

Author David A. Curry
Publisher Addison-Wesley
Copyright Date 1992
ISBN 0-201-56327-4

Unix Security for the Organization

Author Richard Bryant
Publisher Sams
Copyright Date 1994
ISBN 0-672-30571-2

▌≥ε≥ ±∩Φ±εΩ ß√δ ±ε±≥αΓδσφ Φ ΓσΣσ≥±  Jody Patilla (jcp@tis.com), ±∩σ÷ΦαδΦ±≥ε∞ Φτ Trusted Information Systems.

═αταΣ | ╤εΣσ≡µαφΦσ | ┬∩σ≡σΣ