Skip to Main Content
It looks like you're using Internet Explorer 11 or older. This website works best with modern browsers such as the latest versions of Chrome, Firefox, Safari, and Edge. If you continue with this browser, you may see unexpected results.
Florida Tech Evans Library Logo

CYB 5280 - Host and Application Security

Week 5 Readings

Select the link after the article or web resource information to access. 

Ptacek, T. H., Newsham, T. N., & SECURE NETWORKS INC CALGARY ALBERTA. (1998). Insertion, evasion, and denial of service: Eluding network intrusion detection

https://apps.dtic.mil/docs/citations/ADA391565

Saltzer, J. H., & Schroeder, M. D. (1975). The protection of information in computer systems. Proceedings of the IEEE, 63(9), 1278-1308. doi:10.1109/PROC.1975.9939

Read pp.1279-1283

http://portal.lib.fit.edu/login?url=https://ieeexplore.ieee.org/document/1451869

Stolfo, S., Bellovin, S. M., & Evans, D. (2011). Measuring security. IEEE Security & Privacy, 9(3), 60-65. doi:10.1109/MSP.2011.56

http://portal.lib.fit.edu/login?url=https://ieeexplore.ieee.org/document/5772963