to Handle and Identify Network Probes(paper)
paper. Useful for security experts and network admins.
and Commercial Vulnerability Scanners(paper)
about (dis)licensing of such scanners :)
Cyber Attacks, Defenses, and Consequences(paper)
One more paper
about simulating attacks, but this one is much bigger and interesting
Preliminary Classification Scheme for Information System Threats, Attacks,
and Defenses; A Cause and Effect Model; and Some Analysis Based on That
for the security experts or those, who wants to write a book
Network Security: Simulating Network Security(paper)
Atack and defence
Network Security: Watching the World(paper)
Network Security: Attack and Defense Strategies(paper)
How they works
Secure Internet Data Transmission.(paper)
Keeping Hackers Out.(paper)
desing - security.(paper)
encryption, authentification, etc
of Information Security Management(book)
7Mb about almost all security kinds
For Protecting Local Area Networks And Wide Area Networks (LANs/WANs)(paper)
A little old
but with some theoretical things.
and their descriptions.
and Network Security White Paper.
to Denial of Service(paper)
most questions about DoS. With some examples for many OS.
Social Organization Of The Computer Undergroung(paper)
examines the social organization of the "computer underground"
Zero - The Extraordinary Underworld of Hackers, Phreakers, etc.(paper)
Who they are,
why they are.
Security: A Hacker's Guide to Protecting Your Internet Site and Network(book)
Now it's illegal here, but I've sent request to legalize this copy.