Search

Your search keyword '"Unix security"' showing total 26 results

Search Constraints

Start Over You searched for: Descriptor "Unix security" Remove constraint Descriptor: "Unix security"
26 results on '"Unix security"'

Search Results

1. A New Method to Detect Intrusions Using System Calls.

2. Comparing MVS and UNIX Security: The View from the Glass House

3. Unix Security Myths and Truths

4. Practical unix security

5. Reflections on UNIX Vulnerabilities

6. Linux and Unix Security

7. Unix and Linux Security

8. Managing Unix Security

9. General Virtual Hosting via Lightweight User-Level Virtualization

10. Property-based testing of privileged programs

11. Web-Based ITS for Training System Managers on the Computer Intrusion

12. First Steps in Improving Unix Security

14. UNIX Security Features

15. Auditing UNIX

16. A soft real time scheduling server in UNIX operating system

17. Unix security & Kerberos

18. Computer security education: training, scholarship, and research

20. Computer security education: training, scholarship, and research.

21. Specification and verification of the UCLA Unix security kernel

22. Design and Implementation of Secure Xenix

23. UNIX security in a supercomputing environment

24. Specification and verification of the UCLA Unix security kernel (Extended Abstract)

25. On the Design and the Implementation of Secure Xenix Workstations

Catalog

Books, media, physical & digital resources