Unix security

Results: 312



#Item
261Intelligence / Signals intelligence / Military intelligence / SIGINT / National Security Agency / Traffic analysis / Unix signal / Kill / Signals intelligence by alliances /  nations and industries / National security / Espionage / Data collection

P.L[removed]I](DUUlDl](D(1 §13~m(BUU~ (D~13I]~~ [rlDWU ffil!lDWffil! ~~ UJl!£DlDl! f UJ£DW~I1WWlD

Add to Reading List

Source URL: www.nsa.gov

Language: English - Date: 2013-02-13 06:54:24
262System administration / Random password generator / Su / Security / Cryptographic software / Identity management systems / Unix / Cryptography / System software / Password

PDF Document

Add to Reading List

Source URL: www.dss.mil

Language: English - Date: 2014-04-28 13:56:38
263Unix / Credit card / Email / Identity document / Post Office Ltd / Security / Computing / Internet / Redirection

J88352_P944DEC Spec Circ Form.pdf, page 2 @ Preflight[removed]Special Circumstances Form (English.) June 14 )

Add to Reading List

Source URL: www.postoffice.co.uk

Language: English - Date: 2014-06-11 06:03:11
264Authentication / Login / Unix / Self-service password reset / Security / Access control / Password

PDF Document

Add to Reading List

Source URL: www.worldbookonline.com

Language: English - Date: 2011-06-14 08:13:40
265Unix / Windows NT architecture / Network file systems / Chmod / Unix security / Filesystem permissions / Access control list / File system / Security descriptor / Computing / System software / Software

White Paper EMC ISILON MULTIPROTOCOL DATA ACCESS WITH A UNIFIED SECURITY MODEL Abstract

Add to Reading List

Source URL: www.emc.com

Language: English
266Identity document / Electronic identity card / User identifier / User / Identification / Access control / Security / Katso / Unix

Katso ID in electronic customs transactions Contents 1

Add to Reading List

Source URL: www.tulli.fi

Language: English - Date: 2014-06-18 00:59:23
267Unix / Identity management / Compiling tools / Build automation / XACML / Access control / Programmed Data Processor / Configure script / Security Assertion Markup Language / Software / Computing / System software

pam_xacml Contact Information: Tobias Heide Andreas Klenk pam_xacml includes work from Joseph Bester 1 within it‘s distribution.

Add to Reading List

Source URL: pamxacml.sourceforge.net

Language: English - Date: 2008-08-18 07:37:00
268Crime prevention / National security / Role-based access control / Unix / Operating system / Su / BoKS / Grsecurity / Security / Computer security / Access control

Secure4Privilege S4Software, Inc. Addressing system acccess

Add to Reading List

Source URL: www.s4software.com

Language: English - Date: 2010-03-23 17:54:52
269System software / OpenLDAP / Network service / Dynamic DNS / Lightweight Directory Access Protocol / Computer network security / Bastion host / Directory services / Software / Computing

Guide to the Secure Configuration of Red Hat Enterprise Linux 5 Revision 4.2 August 26, 2011 Operating Systems Division Unix Team

Add to Reading List

Source URL: www.nsa.gov

Language: English - Date: 2011-09-14 13:32:51
270Unix / System administration / National Security Agency / Security-Enhanced Linux / Setuid / Superuser / User / Environment variable / Privilege / System software / Computing / Computer security

F8 Security Steve Grubb Red Hat SE Linux Part 2

Add to Reading List

Source URL: www.leap-cf.org

Language: English - Date: 2007-11-16 13:06:24
UPDATE