Unix security

Results: 312



#Item
81System administration / Password / Passwd / Su / Filesystem permissions / Group identifier / YaST / Cryptographic software / Home directory / System software / Software / Unix

CHAPTER 19 Managing Users, Managing Security

Add to Reading List

Source URL: cdn.ttgtmedia.com

Language: English - Date: 2007-11-12 08:47:42
82Unix / Computer network security / Malware / File system / Computer file / Operating system / Device file / Privilege / Configuration file / Computing / Computer security / System software

Proceedings of the 2003 IEEE Workshop on Information Assurance United States Military Academy, West Point, NY June 2001 Detecting Insider Threats by Monitoring System Call Activity Nam Nguyen and Peter Reiher

Add to Reading List

Source URL: lasr.cs.ucla.edu

Language: English - Date: 2003-10-29 13:27:33
83System software / Security / Access control / Computer security / Unix security / Umask / Filesystem permissions / Computing / Unix

Jan 11, 2012 Informix Database Permissions Setup The Fitrix Informix databases can be secured to allow access to tables for read permissions only. This is useful when you have configured ODBC connections for external ap

Add to Reading List

Source URL: www.fitrix.com

Language: English - Date: 2012-01-17 16:20:04
84Access control / Data security / Information security / National security / Authorization / Password / Active Directory / Database security / Unix security / Security / Computer security / Public safety

Access Control Policy Document Status Security Classification

Add to Reading List

Source URL: www.ioe.ac.uk

Language: English - Date: 2015-05-05 02:08:53
85Computer security / Unix / System administration / Spamming / Privileged password management / Password strength / Password / System software / Software

CrimCheck_logo_v3_large_watermark_green

Add to Reading List

Source URL: qld.netball.com.au

Language: English - Date: 2014-12-17 23:15:35
86Computer security / Avira / Dazuko / Solaris / Web server / Ubuntu / Server / System software / Antivirus software / Software

Avira Server Security | Unix User Manual User Manual

Add to Reading List

Source URL: www.avira.com

Language: English - Date: 2013-01-23 11:18:09
87Unix / Mail / Information technology management / Card security code / Fax / Credit card / Business / Technology / System administration / USENIX

THE ADVANCED COMPUTING SYSTEMS ASSOCIATION OFFPRINTS ORDER FORM

Add to Reading List

Source URL: static.usenix.org

Language: English - Date: 2010-03-04 10:53:10
88Computing / System software / Access control / Capability-based security / Mandatory access control / Mandatory Integrity Control / File system / Security-Enhanced Linux / Inode / Unix / Computer security / Inter-process communication

Information Flow Control for Standard OS Abstractions Maxwell Krohn Alexander Yip Micah Brodsky Natan Cliffer M. Frans Kaashoek

Add to Reading List

Source URL: pdos.csail.mit.edu

Language: English - Date: 2008-04-29 08:46:04
89Unix / Cryptographic software / System administration / One-time password / Password / Security token / Two-factor authentication / Shadow password / Challenge-response authentication / Computer security / Security / Access control

One-Time Passwords Hal Pomeranz Deer Run Associates One-Time Passwords – Unix Security Track All material in this course Copyright © Hal Pomeranz and Deer Run Associates,

Add to Reading List

Source URL: www.deer-run.com

Language: English - Date: 2001-02-08 01:03:21
90Internet standards / Internet / Network Time Protocol / Ntpd / Time server / Daemon / Server / Time Protocol / Unix / Internet protocols / System software / Computing

Network Time Protocol Running Unix Apps Securely – Unix Security Track All material in this section Copyright © Hal Pomeranz and Deer Run Associates, 2000. All rights reserved. Hal Pomeranz * Founder/CEO * hal@deer-r

Add to Reading List

Source URL: www.deer-run.com

Language: English - Date: 2001-02-08 01:03:20
UPDATE