Home > Articles > Operating Systems, Server > Solaris

  • Print
  • + Share This
Like this article? We recommend


The following references were used to write this article:

  • Brazilian National Research Network, "References on Network Security and Network Security Teams in Brazil," http://www.rnp.br/cais_en/cais-referencias.html

  • Beattie, S., et al., "Timing the Application of Security Patches for Optimal Value," Proceeding of LISA '02: Sixteenth Systems Administration Conference, Berkeley, CA, USENIX Association, 2002

  • CERT, Software Engineering Institute, "CSIRT FAQ," Carnegie Mellon University, 2002, http://www.cert.org/csirts/csirt_faq.html

  • CERT, Software Engineering Institute, Handbook for Computer Incident Response Teams, Carnegie Mellon University, December 1998

  • CSI and FBI, "2002 CSI/FBI Computer Crime and Security Survey," January 2003, and similar reports from earlier years

  • DFN-CERT, Germany, "Glossary of Computer Security Incident Handling Terms and Abbreviations," September 2002, http://www.cert.dfn.de/eng/pre99papers/certterm.html

  • EICAR, European Institute of Computer Anti-Virus Research, http://www.eicar.org

  • Fraser, B., ed. Site Security Handbook, RFC 2196, Internet Engineering Task Force, September 1997

  • ITU-T Recommendations X.509, ISO/IEC 9594-8: "Information Technology - Open Systems Interconnection - The Directory: Public Key and Attribute Certification Frameworks"

  • Masurkar, Vijay, "Responding to a Customer's Security Incidents (Part I): Establishing Teams and a Policy," Sun BluePrints OnLine, March 2003, http://www.sun.com/blueprints/

  • Noordergraaf, Alex, Enterprise Security: Solaris Operating Environment, Sun Microsystems Press, Prentice Hall, 2002

  • Rude, T., "DD and Computer Forensics,"http://www.crazytrain.com/dd.html

  • Shultz, E., and R. Shumway, Incident Response: A Strategic Guide to Handling System and Network Security Breaches, New Riders Publishing, November, 2001

  • Sun Microsystems, Inc., Solaris Security Toolkit, http//http://www.sun.com/software/security/jass and http://www.sun.com/blueprints/tools

  • Sun Microsystems, Inc., "The Solaris Fingerprint Database - A Security Tool for Solaris Operating Environment Files," 2003

  • United States of America's Federal Computer Incident Response Center (FEDRIC), http://www.fedric.gov/

  • + Share This
  • 🔖 Save To Your Account