Unix security

Results: 312



#Item
21The Return of Unix Command-Line Kung Fu @Hal_Pomeranz Who Is Hal Pomeranz? 

The Return of Unix Command-Line Kung Fu @Hal_Pomeranz Who Is Hal Pomeranz? 

Add to Reading List

Source URL: www.deer-run.com

Language: English - Date: 2010-09-22 20:28:10
22Unix Security Vulnerability Assessment Course All materials are licensed under a Creative Commons Share Alike license. ■ http://creativecommons.org/licenses/by-sa/3.0/

Unix Security Vulnerability Assessment Course All materials are licensed under a Creative Commons Share Alike license. ■ http://creativecommons.org/licenses/by-sa/3.0/

Add to Reading List

Source URL: www.opensecuritytraining.info

Language: English - Date: 2013-11-03 14:53:48
    23How They Do It: Unix Hacking 101 Hal Pomeranz Deer Run Associates  Who Am I?

    How They Do It: Unix Hacking 101 Hal Pomeranz Deer Run Associates Who Am I?

    Add to Reading List

    Source URL: www.deer-run.com

    Language: English - Date: 2004-08-16 11:51:23
    24Jails: Confining the omnipotent root. Poul-Henning Kamp <> Robert N. M. Watson <> The FreeBSD Project  ABSTRACT

    Jails: Confining the omnipotent root. Poul-Henning Kamp <> Robert N. M. Watson <> The FreeBSD Project ABSTRACT

    Add to Reading List

    Source URL: us-east.manta.joyent.com

    Language: English - Date: 2016-01-19 17:45:24
    25Smoot Carl-Mitchell Scottsdale, AZ Unix and Network System Architecture, Security and Administration e-mail:  Voice: +Cell: +

    Smoot Carl-Mitchell Scottsdale, AZ Unix and Network System Architecture, Security and Administration e-mail: Voice: +Cell: +

    Add to Reading List

    Source URL: tic.com

    Language: English - Date: 2004-09-21 19:49:48
      26How to prevent type-flaw guessing attacks on password protocols Sreekanth Malladi and Jim Alves-Foss University of Idaho, USA. June 22, 2003

      How to prevent type-flaw guessing attacks on password protocols Sreekanth Malladi and Jim Alves-Foss University of Idaho, USA. June 22, 2003

      Add to Reading List

      Source URL: www.qatar.cmu.edu

      Language: English - Date: 2004-12-05 23:21:27
      27NCSC-TG-020-A VERSION-1 NATIONAL COMPUTER SECURITY CENTER TRUSTED UNIX WORKING GROUP (TRUSIX) RATIONALE FOR SELECTING

      NCSC-TG-020-A VERSION-1 NATIONAL COMPUTER SECURITY CENTER TRUSTED UNIX WORKING GROUP (TRUSIX) RATIONALE FOR SELECTING

      Add to Reading List

      Source URL: zedz.net

      Language: English - Date: 2002-12-08 10:16:43
        28Eric Wustrow https://ericw.us/trow Current Address 1885 Fuller Rd Ann Arbor, MIphone:

        Eric Wustrow https://ericw.us/trow Current Address 1885 Fuller Rd Ann Arbor, MIphone:

        Add to Reading List

        Source URL: ericw.us

        Language: English - Date: 2014-05-23 17:01:56
        29Oracle security done right. Secure database access on the (unix and linux) operating system level. By Frits Hoogland, VX Company Security is an important part of modern database administration, and is getting even more i

        Oracle security done right. Secure database access on the (unix and linux) operating system level. By Frits Hoogland, VX Company Security is an important part of modern database administration, and is getting even more i

        Add to Reading List

        Source URL: fritshoogland.files.wordpress.com

        Language: English - Date: 2010-01-20 16:35:34
        30A TAXONOMY OF SECURITY FAULTS IN THE UNIX OPERATING SYSTEM A Thesis Submitted to the Faculty of Purdue University by

        A TAXONOMY OF SECURITY FAULTS IN THE UNIX OPERATING SYSTEM A Thesis Submitted to the Faculty of Purdue University by

        Add to Reading List

        Source URL: cwe.mitre.org

        Language: English - Date: 2008-10-29 17:41:00