Back to Results
First PageMeta Content
Cyberwarfare / Operating system / Security / Uttar Pradesh Technical University / Ajay Kumar Garg Engineering College / Computer security / Malware / Rootkit


Security Exercises for the Online Classroom with DETER Peter A. H. Peterson, Peter L. Reiher {pahp, reiher}@cs.ucla.edu University of California, Los Angeles
Add to Reading List

Document Date: 2010-10-21 23:55:25


Open Document

File Size: 223,38 KB

Share Result on Facebook

City

Boston / /

Company

FrobozzCo / MySQL / VMware / /

/

Event

Person Communication and Meetings / /

Facility

University of California / DEfense Technology Experimental Research laboratory / /

IndustryTerm

programmable routers / Web-based education / project software / excellent and powerful tool / web applications / web frontend allowing filtering / online lab manual / software tools / web applications courses / web application / web browser / file systems / actual system software / canonical tools / instant messaging network / software packages / open source tools / physical computer networks / online classes / real software / Internet Protocol / insecure protocols / recent online bank / web server software / root user installing new software / Internet-connected computer / attack tool / Online Classroom / Virtual networking configurations / online coursework / installation media / software archives / lab software / discussion / virtual network hardware / real software systems / potential solution / online master / network intrusion detection systems / fragile software / parallel processing / creative solutions / online security coursework / real production server / exhaustive search / local software / web interface / disk imaging software / online education / monitor networks / typical modern networks / educational software / software vulnerabilities / online course / automation tool / security tools / recommended software tools / virtualization software / virtual networking / http /

MarketIndex

TA / /

Movie

The Story So Far / Man in the Middle / /

OperatingSystem

UNIX / VMs / BSD / Microsoft Windows / Linux / GNU / POSIX / /

Organization

UC Berkeley / University of Utah / Intro Lab / University of California / Los Angeles / /

Person

Wilbar Memboob / John D. Flathead III / Peter A. H. Peterson / Peter L. Reiher / /

Position

system administrator / detective / author / professor / forward / computer forensic scientist and the security engineer / security administrator / /

Product

SQL injections / SQL injection / /

ProgrammingLanguage

SQL / PHP / C / Perl / /

ProvinceOrState

Utah / Mississippi / California / Massachusetts / /

Technology

cyber-DEfense Technology / Linux / instant messaging / operating system / encryption / secure Address Resolution Protocol / GUI / virtual machine / LAN / PHP / UNIX / Cybersecurity Testbed Technology / Perl / operating systems / Ethernet / Internet Protocol / firewall / content management system / video conferencing / HTTP / simulation / insecure protocols / parallel processing / web server / /

URL

http /

SocialTag