2011年9月21日
 
用户名:
密码:
 
新闻快递 | 原创文档 | 咨询培训 | 专家顾问 | 个人专栏 | CSDP | 产业报告 | 上海SPIN | 读编往来
首页 | 企业信息化 | 技术新热点 | 成才乐园New! | 软件工程 | 信息安全 | IT教育 | 软件出口 | 网站论坛
技术新热点
物联网/产品电子代码 
语音挖掘和语音门户
笔计算/输入
论创新
创造性... 
语义Web
Web 智能
自适应Web
数据仓库及挖掘
P2P计算
互联空间
数字游戏开发
实时监控
数据同步
构件框架
中间件技术
多媒体技术
产品线工程
软件规模客户化
嵌入式应用与系统
嵌入式测试
实时操作系统
嵌入式数据库
可编程DSP
电子设计自动化
协同设计
安全性
数字版权管理
技术动态趋势
人工智能
开放源程序
在线分析/数据挖掘
电子商务工程
面向方面程序
再生式程序
计算机支持协同工作
工作流管理
生物信息学
分子计算
量子计算
高性能计算
并行计算
互联网技术
新技术信息资源
博客
RSS
无线局域网
无线固定宽带技术
无线应用
普及计算
柔软晶体管
文档聚类
文档工程 
 
 
入侵检出和防止防火墙
 
Firewalls
http://www.security.ittoolbox.com/nav/t.asp?t=374&p;=374&h1;=374
Firewalls … Why You Need One
http://www.security.ittoolbox.com/documents/document.asp?i=2472
Building Your Firewall Rulebase
http://www.security.ittoolbox.com/documents/document.asp?i=1634
Select The Right Firewall: Part I
http://www.security.ittoolbox.com/documents/document.asp?i=2530
Select The Right Firewall: Part II
http://www.security.ittoolbox.com/documents/document.asp?i=2531
What You Need To Know Before Setting Up a Firewall, Part I
http://www.security.ittoolbox.com/documents/document.asp?i=1726
What You Need To Know Before Setting Up a Firewall, Part II
http://www.security.ittoolbox.com/documents/document.asp?i=1727
The Packet Filter: A Basic Network Security Tool
http://rr.sans.org/firewall/packet_filter.php
Basic Packet Filtering
http://www.security.ittoolbox.com/documents/document.asp?i=580
Advanced Packet Filtering
http://www.security.ittoolbox.com/documents/document.asp?i=579
Firewalls: Folly or Fundamental
http://itreports.computerworld.com/data/detail?id=1001711174_749&type;=RES&x;=1461352278
Intrusion Detection
http://www.sei.cmu.edu/str/descriptions/intrusion_body.html
An Intrusion-Detection Model D.E. Denning Model
http://www.cs.georgetown.edu/~denning/infosec/ids-model.rtf
The History and Evolution of Intrusion Detection
http://rr.sans.org/intrusion/evolution.php
Principles of Intrusion Detection
http://www.cs.colorado.edu/~carzanig/edu/csci7000-001/csci7000-001-f01-24.pdf
Intrusion Detection Systems (IDS)
http://www.daemonnews.org/199905/ids.html
The Role of Intrusion Detection Systems
http://www.computer.org/software/so2000/pdf/s5042.pdf
Multi-Tier Intrusion Detection System
http://rr.sans.org/intrusion/evolution.php
Intrusion Detection Expert System (IDES)
http://www.kolacki.com/IDES.htm
IDS Data Mining
http://www.silkroad.com/papers/html/ids/node4.html
What Is Behavior-Based Intrusion Detection
http://www.sans.org/newlook/resources/IDFAQ/behavior_based.htm
Rule-Based Intrusion Detection
http://www.sei.cmu.edu/str/descriptions/rbid_body.html
Intruder Detection Checklist
http://www.cert.org/tech_tips/intruder_detection_checklist.html
Intrusion Detection Methods Overview
http://www.cs.fsu.edu/~yasinsac/IDS.pdf
Intrusion Detection FAQs version 1.52
http://www.sans.org/newlook/resources/IDFAQ/ID_FAQ.htm
State of The Practice of Intrusion Detection Technologies
http://www.sei.cmu.edu/publications/documents/99.reports/99tr028/
Adaptive Model Generation for Intrusion Detection Systems
http://philby.ucsd.edu/~cse291_IDVA/papers/eskin,miller,zhong,yi,lee,stolfo.adaptive_model_generation_for_ intrusion_detection_systems.pdf
Intrusion Detection Systems & Multisensor Data Fusion: Creating Cyberspace Situational Awareness
http://www.silkroad.com/papers/html/ids/
'Roughing' Up Hackers New Software Technique for Spotting Computer Intruders
http://abcnews.go.com/sections/scitech/CuttingEdge/cuttingedge020308.html
Developing New Means of Detecting Hackers
http://www.security.ittoolbox.com/news/dispnews.asp?i=66316
Pringles: The Latest Hacker Tool
http://www.security.ittoolbox.com/news/Dispnews.asp?i=66315
Git Along, Little Virii
http://www.security.ittoolbox.com/documents/document.asp?i=2548
How To Not Recover From Getting Hacked
http://www.security.ittoolbox.com/documents/document.asp?i=2546
Preparing For The Script-Form Attack
http://www.security.ittoolbox.com/documents/document.asp?i=744
CERT/CC Overview Incident and Vulnerability Trends
http://www.cert.org/present/cert-overview-trends/
On Denial Of Service (DoS) Attacks
http://www.security.ittoolbox.com/nav/t.asp?t=372&p;=380&h1;=372&h2;=379&h3;=380
CERT Denial Of Service Attacks
http://www.cert.org/tech_tips/denial_of_service.html
Managing the Denial of Service Attacks
http://www.cert.org/archive/pdf/Managing_DoS.pdf
Addressing DoS Vulnerabilities
http://www.security.ittoolbox.com/documents/document.asp?i=2592
Trends in DoS Attack Technology
http://www.cert.org/archive/pdf/DoS_trends.pdf
Deconstructing DoS Attacks
http://www.security.ittoolbox.com/documents/document.asp?i=1698
Consensus Roadmap for Defeating Distributed Denial of Service Attacks
http://www.sans.org/ddos_roadmap.htm
The Twenty Most Critical Internet Security Vulnerabilities (Updated)
The Experts' Consensus Version 2.502 January 30, 2002
http://www.sans.org/top20.htm
Vulnerability Assessment Scanners
http://www.networkcomputing.com/1201/1201f1b1.html
SAINT Vulnerability Assessment Tool
http://www.wwdsi.com/saint/
CyberCop Scanner
http://www.pgp.com/products/cybercop-scanner/default.asp
Network Vulnerability Scanner
http://www.astalavista.com/tools/auditing/network/vulnerability/
Internet Scanner
http://documents.iss.net/literature/InternetScanner/is_ps.pdf
Cisco Secure Scanner
http://www.cisco.com/warp/public/cc/pd/sqsw/nesn/
Microsoft Platform Security Products
http://www.securemicrosoft.com/
Distributed Scan Model for Enterprise-Wide Network Vulnerability Assessment
http://rr.sans.org/audit/scan_model.php
CERT/CC Vulnerability Notes Database
http://www.kb.cert.org/vuls/
ICAT Metabase Your Vulnerability Search Engine
http://icat.nist.gov/icat.cfm
Latest Security Vulnerability: Java VMs
http://www.internetweek.com/story/INW20020306S0006
On Viruses, Worms, Trojan Horses
http://www.security.ittoolbox.com/nav/t.asp?t=372&p;=383&h1;=372&h2;=379&h3;=383
Computer Virus Prevention: A Primer
http://www.security.ittoolbox.com/documents/document.asp?i=1621
Antivirus Packages
http://www.security.ittoolbox.com/nav/t.asp?t=372&p;=318&h1;=372&h2;=379&h3;=383&h4;=318
Trojan Horse Attacks
http://www.security.ittoolbox.com/documents/document.asp?i=1393
Hack Attacks Denied: Complete Guide To Network Lockdown (Book) 2001
http://www.security.ittoolbox.com/browse.asp?c=Security+Books&r;=http%3A%2F%2Fwww%2Eamazon%2Ecom%2Fexec%2Fobidos%2FASIN%2F0471416258%2Ferpassist%2F
Hack Proofing Your Ecommerce Site (Book) 2001
http://www.security.ittoolbox.com/browse.asp?c=Security+Books&r;=http%3A%2F%2Fwww%2Eamazon%2Ecom%2Fexec%2Fobidos%2FASIN%2F192899427X%2Ferpassist%2F
H.R.2265 No Electronic Theft (NET) Act
http://thomas.loc.gov/cgi-bin/bdquery/z?d105:h.r.02265:
Internet Firewalls Resources
http://www.cerias.purdue.edu/coast/firewalls/
Network Intrusion Links
http://www.datarescue.com/laboratory/nidslinks.htm
Intrusion Detection Systems (IDS) Bibliography
http://www-rnks.informatik.tu-cottbus.de/~sobirey/idsbibl.html
Critical Infrastructure Assurance Office (CIAO)
http://www.ciao.gov/
National Infrastructure Protection Center (NIPC)
http://www.nipc.gov/
Federal Computer Incidence Response Center (FedCIRC)
http://www.fedcirc.gov/
Critical Infrastructure Assurance Clearinghouse (CIAC)
http://www.ciac.com/crit.htm
IETF Draft for Intrusion Detection Exchange Format
http://www.ietf.org/ids.by.wg/idwg.html
 
 

 友情链接: ACM || CiteSeer || CMU SEI || Construx || Cutter || IEEE-CS || itmWEB
上海市信息委 || 上海市经委 || 上海市软件行业协会 || 上海构件库
TechTarget || 珞珈远望 || 浦华瑞信 || 北京SPIN || CCW聚焦华东 || 软件出口网 更多 
最近更新日 2005.06.28
建议使用IE5.0以上版本(800*600以上) 小字体 浏览
© 2000-2005 软件出口和信息技术传播中心 制作维护: ASTI Shanghai 沪ICP备05025271号
保留所有权益