Teaching hands-on Linux host computer security
Journal on Educational Resources in Computing (JERIC)
A cryptographic access control architecture secure against privileged attackers
Proceedings of the 2007 ACM workshop on Computer security architecture
Dealing with Process Overload Attacks in UNIX
Information Security Journal: A Global Perspective
Cooperative Intrusion Detection Model Based on State Transition Analysis
Computer Supported Cooperative Work in Design IV
Security management of mutually trusted domains through cooperation of defensive technologies
International Journal of Network Management
Predicting computer system failures using support vector machines
WASL'08 Proceedings of the First USENIX conference on Analysis of system logs
Design and analysis of a flexible wireless mobile data sharing device
ICCOMP'06 Proceedings of the 10th WSEAS international conference on Computers
Quantifying the quality of web authentication mechanisms: a usability perspective
Journal of Web Engineering
SSS'05 Proceedings of the 7th international conference on Self-Stabilizing Systems
Security systems design and analysis using an integrated rule-based systems approach
AWIC'05 Proceedings of the Third international conference on Advances in Web Intelligence
Batching: a design pattern for efficient and flexible client/server interaction
Transactions on Pattern Languages of Programming I
SAFECOMP'07 Proceedings of the 26th international conference on Computer Safety, Reliability, and Security
Hi-index | 0.00 |
This new edition of Practical Unix & Internet Security provides detailed coverage of today's increasingly important security and networking issues. Focusing on the four most popular Unix variants today--Solaris, Mac OS X, Linux, and FreeBSD--this book contains new information on PAM (Pluggable Authentication Modules), LDAP, SMB/Samba, anti-theft technologies, embedded systems, wireless and laptop issues, forensics, intrusion detection, chroot jails, telephone scanners and firewalls, virtual and cryptographic filesystems, WebNFS, kernel security levels, outsourcing, legal issues, new Internet protocols and cryptographic algorithms, and much more.