Home > Articles > Operating Systems, Server > Solaris

  • Print
  • + Share This
Like this article? We recommend

References

The following references were used to write this article:

  • CERT, Software Engineering Institute, "CSIRT FAQ," Carnegie Mellon University, 2002, http://www.cert.org/csirts/csirt_faq.html

  • CERT, Software Engineering Institute, Handbook for Computer Incident Response Teams, Carnegie Mellon University, December 1998

  • CSI and FBI, "2002 CSI/FBI Computer Crime and Security Survey," January 2003, and similar reports from earlier years

  • Fraser, B., ed. Site Security Handbook, RFC 2196, Internet Engineering Task Force, September 1997

  • International Information Security Foundation, "Generally Accepted System Security Principles," January 2001, http://web.mit.edu/securitywww/GASSP/GASSP.doc

  • Smith, Danny, "Forming an Incident Response Team," FIRST Conference, July 1994, Australian Computer Emergency Response Team, http://www.auscert.org.au/

  • Weise, Joel, and Charles R. Martin, "Developing a Security Policy," Sun BluePrints OnLine, December 2001, http://www.sun.com/blueprints/

  • + Share This
  • 🔖 Save To Your Account