Trusted Solaris Installation and Configuration

General Computer Security Publications

Denning, Peter J., Computers under Attack: Intruders, Worms and Viruses, ACM Press, Addison-Wesley, Reading, MA, 1990.

Farrow, Rik, "Inside the Internet Worm," UNIXWORLD, June 1990.

Hafner, Katie, and John Markroff, Cyberpunk: Outlaws and Hackers on the Computer Frontier, Simon & Schuster, New York, NY, 1991.

Levy, Steven, Hackers: Heroes of the Computer Revolution, Dell Books, New York, NY, 1984.

McAffe, John, and C. Haynes, Computer Viruses, Worms, Data Diddlers, Killer Programs, and Other Threats to Your System, St. Martin's Press, New York, NY, 1989.

Page, Bob, "A Report on the Internet Worm," University of Lowell, Computer Science Department, November 1988.

Russell, Deborah, and G.T. Gangemi, Sr., Computer Security Basics, O'Reilly & Associates, Inc., Sebastopol, CA, 1990.

"Special Report: Computer Security and the Internet", Scientific American, October 1998. pp 95-117. Contains articles on hackers, firewalls, encryption, digital signatures, and Java, with extensive bibliographies.

Seeley, Donn, "A Tour of the Worm," University of Utah Department of Computer Science, Technical Report, November 1988.

Spafford, Eugene H., "The Internet Worm: Crisis and Aftermath," Communications of the ACM, June 1989.

Stoll, Cliff, The Cuckoo's Egg, Doubleday, Garden City, NY, 1989.

Thompson, Ken, "Reflections on Trusting Trust," 1983 ACM Turing Award Lecture, Communications of the ACM, August 1984.