Unix security

Results: 312



#Item
41Unix / Network architecture / Data security / Hacking / Internet protocols / Firewall / User identifier / Stateful firewall / Setuid / Computer network security / Computing / Computer security

CS 155: Spring 2004 June 2004 CS 155 Final Exam This exam is open books and open notes, but you may not use a laptop. You have 2 hours. Make sure you print your name legibly and sign the honor code below. All of the inte

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2012-04-06 01:23:14
42Unix / Out-of-band / And–or tree / System software / Computing / Electronic engineering / Signaling / Password / Attack tree

CS 161 Fall 2005 Computer Security

Add to Reading List

Source URL: www-inst.eecs.berkeley.edu

Language: English - Date: 2005-11-28 06:37:33
43Android / Embedded Linux / Smartphones / Unix / Monolithic kernels / Ioctl / Kernel / System call / Operating system / Software / Computer architecture / System software

An Empirical Evaluation of the Android Security Framework? Alessandro Armando1,2 , Alessio Merlo1,3,?? , and Luca Verderame1 1 DIBRIS, Università degli Studi di Genova, Italy

Add to Reading List

Source URL: www.csec.it

Language: English - Date: 2014-08-26 05:32:51
44Information / Copyright law of the United States / Copyright / Publication / System administration / USENIX / Unix

CONSENT FORM for REFEREED PAPERS 22nd USENIX Security Symposium August 14–16, 2013, Washington, D.C. USA We must receive signed consent forms from all authors of each paper at the time you submit your files. All author

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2014-02-27 22:49:53
45Access control / Capability-based security / Kernel / Operating system / X Window System / Server / Unix / Software / System software / Computing

Analyzing Capsicum for Usability and Performance Benjamin Farley December 23, 2010 Abstract

Add to Reading List

Source URL: pages.cs.wisc.edu

Language: English - Date: 2010-12-23 01:59:20
46Cyberwarfare / Computer security / Ifconfig / Password / Hacker / Network security / Rootkits / Trojan horses / System software / Computing / Malware

Intruders and UNIX Matt Bishop Department of Computer Science University of California Davis, CAphone: (

Add to Reading List

Source URL: seclab.cs.ucdavis.edu

Language: English - Date: 2004-06-21 18:55:43
47Privilege / System software / Group / Unix / AGDLP / Chmod / Computer security / Computing / Filesystem permissions

Security: Utilizing The Power Of Groups And Roles Presenters: Diane Parsons and Michelle Gresham

Add to Reading List

Source URL: www.nc-sis.org

Language: English - Date: 2015-03-06 11:23:40
48System software / Computer architecture / Software / Datatel / Novell / Unix

 UNIVERSITY SYSTEMS AND SECURITY    INDIVIDUAL ACCOUNT REQUEST Accounts will be active for a maximum of 1 year. They will expire either Jun. 30th or Dec. 30th. Use blue or black pen to fill out form. Requests fo

Add to Reading List

Source URL: isweb.fdu.edu

Language: English - Date: 2012-03-13 12:30:03
49Access control list / Filesystem permissions / Operating system / Capability-based security / File system / Unix / Kernel / Group identifier / Role-based access control / Security / Computer security / Access control

Security Engineering: A Guide to Building Dependable Distributed Systems C H A P TE R 4 Access Control

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2006-12-30 11:29:19
50Multics / Operating system / Unix / Ring / B / Kernel / Linux kernel / System Development Corporation / Capability-based security / Computer architecture / System software / Software

NRL ReportBest Available Technologies (BATs) for Computer Security CARL

Add to Reading List

Source URL: www.landwehr.org

Language: English - Date: 2014-08-18 18:59:16
UPDATE