2011-5-11
 
Account:
 
Password:
     
Home | E-Business | Technology | Software Engineering | Security | Education | Outsourcing
Technology
Internet of Things/EPC 
Audio Mining & Voice Portal
Pen Computing
Creativity & Innovation
Creativity Techniques 
Semantic Web
Web Intelligence
Adaptive Web
Data Warehouse ...
P2P Computing
Interspace
Digital Game ...
Real-Time Computing
Data Synchronization
Component Framework
Middleware
Multimedia
Product Line ...
Software Mass ...
Embedded Apps ...
Embedded Testing
Real-Time OS
Embedded DB
Programmable DSP
Electronic Design ...
Codesign
Security Technology
DRM
Trends in IT
Artificial Intelligence
Open Source
OLAP/Data Mining
e-Business
AOP
GP
CSCW
Workflow Management
Bioinformatics
DNA Computing
Quantum Computing
HPC
Parallel Computing
Internet
New Tech Resources
Blog
RSS
Wi-Fi
LMDS
Wireless Application
Pervasive Computing
Flexible Transistor
Document Clustering
Document English 
 
 Content
Experts  
Industry Report
Shanghai SPIN  
Services
 Column
Tom Gilb
Q & A
Advanced Inspections
Inspection Economics
Evo Project Management
 
Intrusion Detection/Prevention Firewalls
 
Firewalls
http://www.security.ittoolbox.com/nav/t.asp?t=374&p;=374&h1;=374
Firewalls … Why You Need One
http://www.security.ittoolbox.com/documents/document.asp?i=2472
Building Your Firewall Rulebase
http://www.security.ittoolbox.com/documents/document.asp?i=1634
Select The Right Firewall: Part I
http://www.security.ittoolbox.com/documents/document.asp?i=2530
Select The Right Firewall: Part II
http://www.security.ittoolbox.com/documents/document.asp?i=2531
What You Need To Know Before Setting Up a Firewall, Part I
http://www.security.ittoolbox.com/documents/document.asp?i=1726
What You Need To Know Before Setting Up a Firewall, Part II
http://www.security.ittoolbox.com/documents/document.asp?i=1727
The Packet Filter: A Basic Network Security Tool
http://rr.sans.org/firewall/packet_filter.php
Basic Packet Filtering
http://www.security.ittoolbox.com/documents/document.asp?i=580
Advanced Packet Filtering
http://www.security.ittoolbox.com/documents/document.asp?i=579
Firewalls: Folly or Fundamental
http://itreports.computerworld.com/data/detail?id=1001711174_749&type;=RES&x;=1461352278
Intrusion Detection
http://www.sei.cmu.edu/str/descriptions/intrusion_body.html
An Intrusion-Detection Model D.E. Denning Model
http://www.cs.georgetown.edu/~denning/infosec/ids-model.rtf
The History and Evolution of Intrusion Detection
http://rr.sans.org/intrusion/evolution.php
Principles of Intrusion Detection
http://www.cs.colorado.edu/~carzanig/edu/csci7000-001/csci7000-001-f01-24.pdf
Intrusion Detection Systems (IDS)
http://www.daemonnews.org/199905/ids.html
The Role of Intrusion Detection Systems
http://www.computer.org/software/so2000/pdf/s5042.pdf
Multi-Tier Intrusion Detection System
http://rr.sans.org/intrusion/evolution.php
Intrusion Detection Expert System (IDES)
http://www.kolacki.com/IDES.htm
IDS Data Mining
http://www.silkroad.com/papers/html/ids/node4.html
What Is Behavior-Based Intrusion Detection
http://www.sans.org/newlook/resources/IDFAQ/behavior_based.htm
Rule-Based Intrusion Detection
http://www.sei.cmu.edu/str/descriptions/rbid_body.html
Intruder Detection Checklist
http://www.cert.org/tech_tips/intruder_detection_checklist.html
Intrusion Detection Methods Overview
http://www.cs.fsu.edu/~yasinsac/IDS.pdf
Intrusion Detection FAQs version 1.52
http://www.sans.org/newlook/resources/IDFAQ/ID_FAQ.htm
State of The Practice of Intrusion Detection Technologies
http://www.sei.cmu.edu/publications/documents/99.reports/99tr028/
Adaptive Model Generation for Intrusion Detection Systems
http://philby.ucsd.edu/~cse291_IDVA/papers/eskin,miller,zhong,yi,lee,stolfo.adaptive_model_generation_for_ intrusion_detection_systems.pdf
Intrusion Detection Systems & Multisensor Data Fusion: Creating Cyberspace Situational Awareness
http://www.silkroad.com/papers/html/ids/
'Roughing' Up Hackers New Software Technique for Spotting Computer Intruders
http://abcnews.go.com/sections/scitech/CuttingEdge/cuttingedge020308.html
Developing New Means of Detecting Hackers
http://www.security.ittoolbox.com/news/dispnews.asp?i=66316
Pringles: The Latest Hacker Tool
http://www.security.ittoolbox.com/news/Dispnews.asp?i=66315
Git Along, Little Virii
http://www.security.ittoolbox.com/documents/document.asp?i=2548
How To Not Recover From Getting Hacked
http://www.security.ittoolbox.com/documents/document.asp?i=2546
Preparing For The Script-Form Attack
http://www.security.ittoolbox.com/documents/document.asp?i=744
CERT/CC Overview Incident and Vulnerability Trends
http://www.cert.org/present/cert-overview-trends/
On Denial Of Service (DoS) Attacks
http://www.security.ittoolbox.com/nav/t.asp?t=372&p;=380&h1;=372&h2;=379&h3;=380
CERT Denial Of Service Attacks
http://www.cert.org/tech_tips/denial_of_service.html
Managing the Denial of Service Attacks
http://www.cert.org/archive/pdf/Managing_DoS.pdf
Addressing DoS Vulnerabilities
http://www.security.ittoolbox.com/documents/document.asp?i=2592
Trends in DoS Attack Technology
http://www.cert.org/archive/pdf/DoS_trends.pdf
Deconstructing DoS Attacks
http://www.security.ittoolbox.com/documents/document.asp?i=1698
Consensus Roadmap for Defeating Distributed Denial of Service Attacks
http://www.sans.org/ddos_roadmap.htm
The Twenty Most Critical Internet Security Vulnerabilities (Updated)
The Experts' Consensus Version 2.502 January 30, 2002
http://www.sans.org/top20.htm
Vulnerability Assessment Scanners
http://www.networkcomputing.com/1201/1201f1b1.html
SAINT Vulnerability Assessment Tool
http://www.wwdsi.com/saint/
CyberCop Scanner
http://www.pgp.com/products/cybercop-scanner/default.asp
Network Vulnerability Scanner
http://www.astalavista.com/tools/auditing/network/vulnerability/
Internet Scanner
http://documents.iss.net/literature/InternetScanner/is_ps.pdf
Cisco Secure Scanner
http://www.cisco.com/warp/public/cc/pd/sqsw/nesn/
Microsoft Platform Security Products
http://www.securemicrosoft.com/
Distributed Scan Model for Enterprise-Wide Network Vulnerability Assessment
http://rr.sans.org/audit/scan_model.php
CERT/CC Vulnerability Notes Database
http://www.kb.cert.org/vuls/
ICAT Metabase Your Vulnerability Search Engine
http://icat.nist.gov/icat.cfm
Latest Security Vulnerability: Java VMs
http://www.internetweek.com/story/INW20020306S0006
On Viruses, Worms, Trojan Horses
http://www.security.ittoolbox.com/nav/t.asp?t=372&p;=383&h1;=372&h2;=379&h3;=383
Computer Virus Prevention: A Primer
http://www.security.ittoolbox.com/documents/document.asp?i=1621
Antivirus Packages
http://www.security.ittoolbox.com/nav/t.asp?t=372&p;=318&h1;=372&h2;=379&h3;=383&h4;=318
Trojan Horse Attacks
http://www.security.ittoolbox.com/documents/document.asp?i=1393
Hack Attacks Denied: Complete Guide To Network Lockdown (Book) 2001
http://www.security.ittoolbox.com/browse.asp?c=Security+Books&r;=http%3A%2F%2Fwww%2Eamazon%2Ecom%2Fexec%2Fobidos%2FASIN%2F0471416258%2Ferpassist%2F
Hack Proofing Your Ecommerce Site (Book) 2001
http://www.security.ittoolbox.com/browse.asp?c=Security+Books&r;=http%3A%2F%2Fwww%2Eamazon%2Ecom%2Fexec%2Fobidos%2FASIN%2F192899427X%2Ferpassist%2F
H.R.2265 No Electronic Theft (NET) Act
http://thomas.loc.gov/cgi-bin/bdquery/z?d105:h.r.02265:
Internet Firewalls Resources
http://www.cerias.purdue.edu/coast/firewalls/
Network Intrusion Links
http://www.datarescue.com/laboratory/nidslinks.htm
Intrusion Detection Systems (IDS) Bibliography
http://www-rnks.informatik.tu-cottbus.de/~sobirey/idsbibl.html
Critical Infrastructure Assurance Office (CIAO)
http://www.ciao.gov/
National Infrastructure Protection Center (NIPC)
http://www.nipc.gov/
Federal Computer Incidence Response Center (FedCIRC)
http://www.fedcirc.gov/
Critical Infrastructure Assurance Clearinghouse (CIAC)
http://www.ciac.com/crit.htm
IETF Draft for Intrusion Detection Exchange Format
http://www.ietf.org/ids.by.wg/idwg.html
 
 

 Links: ACM || CiteSeer || CMU SEI || Construx || Cutter || IEEE-CS || itmWEB
Shanghai IT || Shanghai Economic Commission || SSIA || Shanghai Component Repository
LJYW || SPRT || PKSPIN || CCW Shanghai || China IT Outsourcing Summit more 
contribution guide | FAQ | about | copyright | contact
last update on 2005-04-08
better use IE 5.0 or above (800*600 or above)
© 2000-2005 Software Export and IT Transfer Center, ASTI Shanghai
All Rights Reserved.