Unix security

Results: 312



#Item
131Electronic commerce / Credit card / Email / Cheque / Fax / Card security code / Mail / Technology / Business / Payment systems

Order Form  YES, SEND ME ____ COPY (ies) of Venice Shall Rise Again - Engineered Uplift of Venice through Seawater Injection ON CD-ROM, READABLE IN ANY COMPUTER PLATFORM (PC/MAC/UNIX).  I ENCLOSE A CHECK OR MONEY O

Add to Reading List

Source URL: www.envirocomp.org

Language: English - Date: 2013-02-11 16:34:15
132Database management systems / Relational database management systems / Data security / National security / Oracle Database / Copyright law of the United States / Backup / Password / Computer security / Data / Information / Data management

Oracle_Security_Unix_SIG_2009_6slides

Add to Reading List

Source URL: www.petefinnigan.com

Language: English - Date: 2009-05-21 09:48:46
133Computing / Pete Finnigan / Oracle Database / Data management / Copyright law of the United States / Password / Barbara Gordon / Database / Software / Relational database management systems / Oracle Corporation

Microsoft PowerPoint - Oracle_Security_Unix_SIG_2010_part_1

Add to Reading List

Source URL: www.petefinnigan.com

Language: English - Date: 2010-09-09 13:19:50
134Relational database management systems / Oracle Corporation / Data management / Oracle Database / Pete Finnigan / Copyright law of the United States / Barbara Gordon / Copyright / Database / Software / Data / Information

Microsoft PowerPoint - Oracle_Security_Unix_SIG_2010_part_2

Add to Reading List

Source URL: www.petefinnigan.com

Language: English - Date: 2010-09-09 13:18:38
135Computer security / Software testing / Multi-agent systems / Spamming / Botnet / Penetration test / Exploit / Social engineering / X Window System / Computing / Hacking / Computer network security

They’re Hacking Our Clients! Why Are We Only Vuln Assessing Servers? Jay Beale Creator - Bastille UNIX Co-Founder - Intelguardians, Inc.

Add to Reading List

Source URL: www.shmoocon.org

Language: English - Date: 2010-11-01 16:47:07
136Majordomo / Computer network security / Silicon Valley / Firewall / USENIX / Unix / Computing / Geography of California / Software

[removed]Entrepreneurship.UofA.ppt

Add to Reading List

Source URL: www.greatcircle.com

Language: English - Date: 2006-02-01 17:57:56
137Computer security / Software / Standards organizations / Unix / Consortia / The Open Group / Information security / Single UNIX Specification / Interoperability / POSIX / Computing / System software

Manager’s Guides MANAGER’S GUIDE TO INFORMATION SECURITY What to look for when you buy By

Add to Reading List

Source URL: www.articsoft.com

Language: English - Date: 2013-12-10 13:50:54
138Software / Firewall / PF / Network security / Bastion host / Denial-of-service attack / Router / Berkeley Software Distribution / Unix security / Computer network security / Computing / System software

Secure Internet Servers/Firewalls with Ian F. Darwin http://www.darwinsys.com

Add to Reading List

Source URL: www.openbsd.org

Language: English - Date: 2002-12-08 13:48:56
139Disk file systems / Unix / Data recovery / Inode / File system / Dd / Device file / Disk partitioning / Volume table of contents / System software / Computing / Software

Digital Forensics For Unix The SANS Institute John Green – [removed] Hal Pomeranz – [removed] Unix Forensics and Investigations – Unix Security Track

Add to Reading List

Source URL: www.deer-run.com

Language: English - Date: 2009-01-26 16:52:51
140Unix / Disk file systems / Computer security / Seccomp / Sandbox / Special purpose file systems / Ptrace / XFS / File system / System software / Computing / Software

Practical and effective sandboxing for non-root users Taesoo Kim and Nickolai Zeldovich MIT CSAIL Abstract

Add to Reading List

Source URL: pdos.csail.mit.edu

Language: English - Date: 2015-03-27 16:16:57
UPDATE