The design and implementation of tripwire: a file system integrity checker
CCS '94 Proceedings of the 2nd ACM Conference on Computer and communications security
Catapults and grappling hooks: the tools and techniques of information warfare
IBM Systems Journal
International Journal of Networking and Virtual Organisations
Review: TCP/IP security threats and attack methods
Computer Communications
Hi-index | 0.00 |
Systems such as Kerberos, designed to provide secure user and service authentication over insecure open networks, continue to gain acceptance in the UNIX world. There are both freely available and commercial products which reduce the vulnerabilities ...