"The more complex our security becomes, the more complex our enemy's efforts must be. The more we seek to shut him out, the better he must learn to become at breaking in. Each new level of security that we manage becomes no more than a stepping-stone for him who would surpass us, for he bases his next assault upon our best defenses." From This Alien Shore by C.S. Friedman
07/24/00 Committee on the Judiciary - Perrine Statement, a timely piece on freedom and privacy.
Protecting Network Infrastructure at the Protocol Level
Recommendations for Improving the Security of Solaris 8.
The Intrusion Detection System Evaluation.
Forensics Frequently Asked Questions (FAQ)
Computer and Network Security: Best Practices
An Introduction to Intrusion Detection and Assessment
Strategic Scanning and Assessments of Remote Hosts (SSARH)
Improving the Security of Your Site by Breaking Into It.
Observations about Hackers and the Network Security Industry.
The Zenith Star (Eligible Receiver Redux)
The Internet Auditing Project (beta 1)
Eligible Receiver (The Government takes Notice)
Last modified: Sat Oct 30 23:13:15 PDT 2004