|
[1] 王效蘭發行(民九十年‧五月),「白宮網站爆灌一度關閉」,聯 合報 [2] 李志成譯,堀田 倫英、石井 達夫、廣川 類著(民八九年‧九 月),PHP與PostgreSQL徹底攻略,博碩文化 [3] 李卓桓、瞿華等編著,百資科技編譯(民九十年‧二月),Linux網 路程式設計,機械工業出版社 [4] 林育生、嚴大中、廖百齡、俞齊醒、陳寶騏、江清泉等著(民九十 年‧十二月),「整合式網路安全系統」,國防通信電子及資訊季 刊,第二期,頁23-36 [5] 施威銘研究室編著,(民八九年‧十二月),RED HAT LINUX 7 指 令參考手冊,旗標出版 [6] 曾守正著(民八九年‧八月),資料庫系統之理論與實務,儒林書 局 [7] 張仁川、葉俊賢著(民九十年‧五月),精通FrontPage 2000,文 魁書局 [8] 張維國譯(民九十年‧十一月),Tim Converse、Joyce Park著, 精通PHP,博碩文化 [9] 楊文誌著(民八九年‧六月),深入LINUX建構與管理,旗標出版 [10] 閰雪著(民八九年‧八月),中國大陸的駭客技術,松崗書局 [11] Andrew S.T., Computer Networks, 3 rd Ed, Prentice-Hall, 1996. [12] Computer Coordination Center., “CERT Advisory CA-96-26 Denial- of-Service Attack via pings”, http://www.cert.org/advisories /CA-1996 -26 .html”, Dec. 1996. - visited 20.5.2001. [13] Computer Coordination Center, “CERT Advisory “CA-97-28 IP Denial- of-Service Attacks”, http://www.cert.org/advisories/CA-1997-28.html”, Dec. 1997. - visited 20.5.2001. [14] Computer Coordination Center, “CERT Advisory “CA-2000- 01 Denial- of-Service Developments”, http://www.cert.org/advisories/CA-2000- 01.html”, Jan. 2000. - visited 20.5.2001. [15] Computer Coordination Center, “CERT Advisory “CA-1998- 13 Vulnera -bility in Certain TCP/IP Implementations” http://www.cert. org/ advisories/CA-1998-13.html”, Dec. 1998. - visited 20.5.2001. [16] Chen Y.W., “Study on the prevention of SYN flooding by using traffic policing”, IEEE/IFIP NOMS, pp. 593 -604, 2000. [17] Elliot J., “Distributed denial of service attacks and the zombie ant effect”, IT Professional, pp. 55-57, Mar./Apr. 2000. [18] Ferguson P., Senie D., “Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing”, Jan. 1998. [19] Frank Kargl, Joern Maier, Michael Weber, ”Protecting Web Servers from Distributed Denial of Service Attacks”, The Tenth International World Wide Web Conference, ACM, May 2001. [20] Fulp E., Zhi Fu, Reeves D.S., Wu S.F., Xiaobing Zhang, “Preventing denial of service attacks on quality of service”, DARPA Information Survivability Conference & Exposition II, pp. 159 -172, 2001 [21] Gregg D. M., Blackert W. J., Heinbuch D.V., Furnanage D., “Assessing and quantifying denial of service attacks”, IEEE MILCOM: Communications for Network-Centric Operations, pp. 76-80, 2001. [22] Harris B., Hunt R., “TCP/IP security threats and attack methods”, ELSEVIER Computer Communications, Feb. 1999. [23] Lau F., Rubin S. H., Smith M. H., Trajkovic L., “Distributed Denial of Service Attacks”, IEEE International Conference on System, Man, and Cybernetic, 2000. [24] Momjian B., PostgreSQL Introduction and Concepts. Addison -Wesley., Nov. 2000. [25] Roger M. N., “Denial of Service”, Communications of the ACM, ACM, Nov. 1994. [26] SecurityFocus Corporation Site, http://www.securityfocus.com - visited 25.3.2001. [27] Stuart Mcclure, Joel Scambray, George Kurrt, Hacking Exposed: Network Security Secrets and Solutions, Third Edition, Osborne/McGraw-Hill, Apr. 2001. [28] Stevens W. R., Advanced Programming in the Unix Environment, Addison-Wesley., Sep. 2000. [29] Stevens W. R., TCP/IP Illustrated, Volume 1 The Protocols, Addison-Wesley, Oct. 1999. [30] Stevens W. R., TCP/IP Illustrated, Volume 3 TCP for Transactions, HTTP, NNTP, and the Unix Domain Protocols, Addison-Wesley, Jan. 1996. [31] Stevens W. R., Unix Network Programming Volume 1, Prentice-Hall, Jul. 1998. [32] Stevens W. R., Unix Network Programming Volume 2, Prentice-Hall, Jul. 1998. [33] Stevens W. R., Wright G. R., TCP/IP Illustrated, Volume 2 The Implementation, Addison-Wesley, Jul. 2000. [34] Warren W. G., Linux Socket Programming by Example, Que., Apr. 2000. [35] Wooding K., “Magnification Attacks - Smurf, Fraggle, and Others”, http://www.pintday.org/whitepapers/dos-smurf.shtml- visited 25.3.2001.
|