Unix security

Results: 312



#Item
41CS 155: Spring 2004 June 2004 CS 155 Final Exam This exam is open books and open notes, but you may not use a laptop. You have 2 hours. Make sure you print your name legibly and sign the honor code below. All of the inte

CS 155: Spring 2004 June 2004 CS 155 Final Exam This exam is open books and open notes, but you may not use a laptop. You have 2 hours. Make sure you print your name legibly and sign the honor code below. All of the inte

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2012-04-06 01:23:14
42CS 161  Fall 2005 Computer Security

CS 161 Fall 2005 Computer Security

Add to Reading List

Source URL: www-inst.eecs.berkeley.edu

Language: English - Date: 2005-11-28 06:37:33
43An Empirical Evaluation of the Android Security Framework? Alessandro Armando1,2 , Alessio Merlo1,3,?? , and Luca Verderame1 1  DIBRIS, Università degli Studi di Genova, Italy

An Empirical Evaluation of the Android Security Framework? Alessandro Armando1,2 , Alessio Merlo1,3,?? , and Luca Verderame1 1 DIBRIS, Università degli Studi di Genova, Italy

Add to Reading List

Source URL: www.csec.it

Language: English - Date: 2014-08-26 05:32:51
44CONSENT FORM for REFEREED PAPERS 22nd USENIX Security Symposium August 14–16, 2013, Washington, D.C. USA We must receive signed consent forms from all authors of each paper at the time you submit your files. All author

CONSENT FORM for REFEREED PAPERS 22nd USENIX Security Symposium August 14–16, 2013, Washington, D.C. USA We must receive signed consent forms from all authors of each paper at the time you submit your files. All author

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2014-02-27 22:49:53
45Analyzing Capsicum for Usability and Performance Benjamin Farley December 23, 2010 Abstract

Analyzing Capsicum for Usability and Performance Benjamin Farley December 23, 2010 Abstract

Add to Reading List

Source URL: pages.cs.wisc.edu

Language: English - Date: 2010-12-23 01:59:20
46Intruders and UNIX Matt Bishop Department of Computer Science University of California Davis, CAphone: (

Intruders and UNIX Matt Bishop Department of Computer Science University of California Davis, CAphone: (

Add to Reading List

Source URL: seclab.cs.ucdavis.edu

Language: English - Date: 2004-06-21 18:55:43
47Security: Utilizing The Power Of Groups And Roles Presenters: Diane Parsons and Michelle Gresham

Security: Utilizing The Power Of Groups And Roles Presenters: Diane Parsons and Michelle Gresham

Add to Reading List

Source URL: www.nc-sis.org

Language: English - Date: 2015-03-06 11:23:40
48 UNIVERSITY SYSTEMS AND SECURITY 	
   	
  INDIVIDUAL ACCOUNT REQUEST Accounts will be active for a maximum of 1 year. They will expire either Jun. 30th or Dec. 30th. Use blue or black pen to fill out form. Requests fo

 UNIVERSITY SYSTEMS AND SECURITY    INDIVIDUAL ACCOUNT REQUEST Accounts will be active for a maximum of 1 year. They will expire either Jun. 30th or Dec. 30th. Use blue or black pen to fill out form. Requests fo

Add to Reading List

Source URL: isweb.fdu.edu

Language: English - Date: 2012-03-13 12:30:03
49Security Engineering: A Guide to Building Dependable Distributed Systems  C H A P TE R 4 Access Control

Security Engineering: A Guide to Building Dependable Distributed Systems C H A P TE R 4 Access Control

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2006-12-30 11:29:19
50NRL ReportBest Available Technologies (BATs) for Computer Security CARL

NRL ReportBest Available Technologies (BATs) for Computer Security CARL

Add to Reading List

Source URL: www.landwehr.org

Language: English - Date: 2014-08-18 18:59:16