Βιβλιογραφία
- Andrew S. Tanenbaum
Σύγχρονα λειτουργικά συστήματα. σ. 248-278
Εκδόσεις Παπασωτηρίου, 1993.
- Δημήτρης Γκρίτζαλης και Στέφανος Γκρίτζαλης
Ασφάλεια λειτουργικών συστημάτων.
Εκδόσεις ΜΙΤ Εκπαιδευτική - Αναπτυξιακή, 1993.
- Peter J. Denning.
Computers Under Attack: Intruders, Worms, and Viruses.
Addison-Wesley, 1990.
- Tom Forester and
Perry Morrison.
Computer Ethics: Cautionary Tales and Ethical Dilemmas in
Computing.
MIT Press, 1990.
- F. T. Grampp and R. H.
Morris.
UNIX operating system security.
Bell System Technical Journal, 63(8), October 1984.
- Stefanos
Gritzalis and Diomidis Spinellis.
Addressing threats
and security issues in World Wide Web technology.
In Proceedings CMS '97 3rd IFIP TC6/TC11 International joint working
Conference on Communications and Multimedia Security, pages 33–46,
Athens, Greece, September 1997. IFIP, Chapman & Hall.
- Stefanos
Gritzalis and Diomidis Spinellis.
Cryptographic
protocols over open distributed systems: A taxonomy of flaws and related
protocol analysis tools.
In 16th International Conference on Computer Safety, Reliability and
Security: SAFECOMP '97, pages 123–137, York, UK, September 1997.
European Workshop on Industrial Computer Systems: TC-7, Springer Verlag.
- Robert Morris.
Password security: A case history.
Communications of the ACM, 22(11):594–597, November 1979.
- Charles Pfleeger.
Security in Computing.
Prentice-Hall, 1996.
- Dennis M. Ritchie.
On the
security of UNIX.
In UNIX Programmer's manual: Supplementary Documents, volume 2,
pages 592–594. Holt, Rinehart and Winston, seventh edition, 1982.
- Eugene H. Spafford.
The internet worm program: An analysis.
Technical Report CSD-TR-823, Purdue University, West Lafayette, IN 47907-2004,
November 1988.
- Ken L. Thompson.
Reflections on trusting trust.
Communications of the ACM, 27(8):761–763, 1984.