next up previous contents
Next: Principi universali di valutazione Up: Una metodologia per la Previous: Ringraziamenti   Indice


Bibliografia

[1]
Common Criteria Ver. 2.1. anche ISO 15408
Online http://www.commoncriteria.org/

[2]
Allen Julia H. ``The CERT Guide to System and Network Security Practices'', USA, Addison-Wesley, 2000.
[3]
McClure Stuart, Scambray Joel, Kurtz George ``HACKER!- Prevenire gli attacchi informatici è possibile Tecniche di protezione dei sistemi'', Bologna, Apogeo, 2000.
[4]
Fugini Maria Grazia, Maio Fabrizio, Plebani Pierluigi ``Sicurezza dei Sistemi Informatici'', Bologna, Apogeo,2000.
[5]
Gollmann Dieter``Computer Security'', John Wiley & Sons, 1999.
[6]
Anonymous,``Maximum Linux Security - A hacker's guide to protecting your Linux server and workstation'', USA, SAMS, 1999.
[7]
Frisch Aeleen, ``Essential System Administration 2nd Edition'',USA, O'Reilly, 1995, Cap. 6.
[8]
Alberts, Christopher J., Behrens Sandra G. Pethia Richard D., & Wilson William R Operationally Critical Threat, Asset, and Vulnerability $Evaluation^{SM}$ ($OCTAVE^{SM}$) Framework Version 1.0 (CMU/SEI-99-TR-017), Pittsburg, PA, Software Engineering Institute, Carnegie Mellon University, june 1999.
[9]
Bugtraq Mailing list
Online: http://www.securityfocus.com
[10]
Computer Emergency Response Team
Online: http://www.cert.org/
[11]
SuSE Security Mailing List
Online: http://www.suse.com
[12]
Daniele Medri ``Linux facile''
Online: http://www.linuxfacile.org


next up previous contents
Next: Principi universali di valutazione Up: Una metodologia per la Previous: Ringraziamenti   Indice
Gian Fabio Palmerini 2001-10-31