Unix security

Results: 312



#Item
281Netstat / Unix / Computer architecture / Computer network security / Port / Transmission Control Protocol / Internet protocol suite / Unix domain socket / Firewall / Computing / Network socket / System software

Sockets Performance Tuning Infrastructure Perspective Ken Gottry May[removed]

Add to Reading List

Source URL: kgottryjoy.gottry.com

Language: English - Date: 2002-04-18 19:07:52
282Oracle Corporation / Solaris / Mac OS X / Unix / Proprietary software / Comparison of Business Process Modeling Notation tools / Software / Computer architecture / OpenSolaris

Information Security Corporation

Add to Reading List

Source URL: www.infoseccorp.com

Language: English - Date: 2003-11-12 12:55:14
283Crime prevention / National security / Data security / Identity management / Password / Information security / Access control / Vulnerability / Unix security / Security / Computer security / Cyberwarfare

NCC Computer Systems & Information Use Policy March 20, 2013 Submitted by: Michael Oldenkamp Director, Technology and Information Services

Add to Reading List

Source URL: www.nwicc.edu

Language: English - Date: 2013-03-25 09:18:42
284System administration / Mach / National Security Agency / Security-Enhanced Linux / Sudo / Berkeley Software Distribution / Unix / Operating system / FLASK / Software / System software / Computing

Todd C. Miller 1231 Riverside Ave Baltimore, MD[removed]6877 (phone) [removed]

Add to Reading List

Source URL: www.courtesan.com

Language: English - Date: 2010-12-08 15:03:59
285Unix / Linux / Linux kernel / File system / Operating system / Runlevel / GNU GRUB / Arch Linux / Security-Enhanced Linux / Software / System software / Computing

Introduction to Linux A Hands on Guide

Add to Reading List

Source URL: www.tldp.org

Language: English - Date: 2008-06-06 09:26:05
286Ls / Filesystem permissions / Id / Access control / Unix / Computing / Ln / Append

2008 Paper 4 Question 7 Introduction to Security

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2013-09-26 09:50:47
287System administration / Computing / Shadow password / Unix security / Passwd / Group identifier / Home directory / Su / Password / System software / Unix / Software

UNIX Security By Rajib K. Mitra Copyright 1998 Rajib K. Mitra

Add to Reading List

Source URL: www.spy.net

Language: English - Date: 1998-07-10 17:12:27
288Chroot / FreeBSD jail / Operating system-level virtualization / FreeBSD / Unix security / Procfs / Operating system / Securelevel / Kernel / System software / Software / Unix

Jails: Confining the omnipotent root. Poul-Henning Kamp Robert N. M. Watson

Add to Reading List

Source URL: www.watson.org

Language: English - Date: 2004-01-01 14:02:41
289Systrace / Computer security / Unix / Kernel / System call / Operating system / Principle of least privilege / Microkernel / Chroot / System software / Software / Computer architecture

Improving Host Security with System Call Policies Niels Provos Center for Information Technology Integration

Add to Reading List

Source URL: www.citi.umich.edu

Language: English - Date: 2003-08-09 19:06:41
290Unix / Computer security / Access control / Capability-based security / Sandbox / File descriptor / Open / Unix domain socket / FreeBSD / Software / System software / Computing

Capsicum: practical capabilities for UNIX Robert N. M. Watson University of Cambridge

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2010-06-02 06:08:28
UPDATE