There exists a large body of literature covering networks and security. Listed below are some of the best we have found. Each of these documents is available via anonymous file transfer from various sites on the Internet. We are grateful to the authors who prepared these documents and made them freely available. In that spirit, we will gladly provide machine-readable copies of any of the Raptor documents upon request.
There are other documents which you might be interested to read, but copyright restrictions prevent us from distributing them freely. These include:
These are available from many sites on the internet via anonymous ftp. In particular, through the courtesy of John Scoggin at Delmarva Power and Light, one may copy a variety of security-related documents from:
Machine: ftp.delmarva.com
IP Address: 138.39.7.10
For good references on the fundamentals of Unix security, we recommend Practical Unix Security by Spafford and Garfinkel, published by O'Reilly &Associates as one of their Nutshell Handbooks, and Unix System Security by David A. Curry, published by Addison Wesley. Appendix E of Practical Unix Security contains an extensive bibliography of computer security books.
The Rainbow series is a collection of U.S. Government volumes which describes functional and assurance requirements for computer systems, trusted databases, and assembling systems out of trusted components, and network systems. You may request one complimentary copy of the Rainbow series of computer security manuals by calling (410) 766-8729 or (410) 688-8742 or by writing:
Department of Defense
National Security Agency
ATTN: S332
9800 Savage Road
Ft George G. Meade, MD 20755-6000
Finally you might want to review Federal Criteria for Information
Technology Security, Volumes 1 &2. It is currently in draft form
and is available via ftp from ftp.delmarva.com as
/pub/security/fcvol.
Next: Mailing List
Up: Preface
Previous: Preface