Security Identifier

Results: 389



#Item
381Software / User identifier / Password / Filesystem permissions / File system / Rm / Computer file / Group identifier / Privilege / Unix / Computing / System software

system and offers a number of hints on how to improve security. The first fact to face is that UNIX was not developed with security, in any realistic sense, in mind; this fact alone guarantees a vast number of holes. (Ac

Add to Reading List

Source URL: wolfram.schneider.org

Language: English - Date: 2012-01-08 15:19:27
382Tax / Social Security number / Information / Business / Money / Taxation in the United States / Identifier / Metadata

Consultant Information Sheet 2014

Add to Reading List

Source URL: www.wsdot.wa.gov

Language: English - Date: 2014-06-01 19:03:56
383Security / Health sciences / Industrial hygiene / Medicine / Safety engineering / Risk and Safety Statements / Material safety data sheet / Chemical warfare / Dangerous goods / Safety / Health / Occupational safety and health

MATERIAL SAFETY DATA SHEET NORCROS DISPERSION ADHESIVE SECTION 1: IDENTIFICATION OF THE SUBSTANCE/MIXTURE AND THE COMPANY/UINDERTAKING 1.1 PRODUCT IDENTIFIER: Tile to Walls Red Lid

Add to Reading List

Source URL: www.nxadh.co.uk

Language: English - Date: 2014-03-27 14:58:28
384System administration / Computing / Shadow password / Unix security / Passwd / Group identifier / Home directory / Su / Password / System software / Unix / Software

UNIX Security By Rajib K. Mitra Copyright 1998 Rajib K. Mitra

Add to Reading List

Source URL: www.spy.net

Language: English - Date: 1998-07-10 17:12:27
385System administration / Computing / Unix security / Shadow password / Passwd / Group identifier / Su / Home directory / Password / System software / Unix / Software

RTF Document

Add to Reading List

Source URL: www.spy.net

Language: English - Date: 1998-04-07 23:15:13
386Access control / Security-Enhanced Linux / FLASK / Mandatory access control / Type enforcement / Multilevel security / Role-based access control / Security Identifier / Operating system / Computer security / Security / System software

Integrating Flexible Support for Security Policies into the Linux Operating System Peter Loscocco, NSA, [removed]

Add to Reading List

Source URL: www.nsa.gov

Language: English - Date: 2003-12-29 17:06:34
387Software / Unix security / Filesystem permissions / File system / Rm / Computer file / Privilege / Password / Group identifier / Unix / Computing / System software

PDF Document

Add to Reading List

Source URL: www.tom-yam.or.jp

Language: English - Date: 2003-04-02 18:48:42
388Unix / Access control / User identifier / Setuid / Filesystem permissions / Mandatory access control / Principle of least privilege / Discretionary access control / Multilevel security / Computer security / Security / Computing

PDF Document

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2004-03-30 13:44:01
389Web services / Windows CardSpace / URI schemes / WS-MetadataExchange / WS-SecurityPolicy / HTML / Uniform resource identifier / WS-Security / Security Assertion Markup Language / Computing / Federated identity / Information Card

PDF Document

Add to Reading List

Source URL: download.microsoft.com

Language: English - Date: 2007-05-07 00:55:23
UPDATE