ARTS 103 Lecture Notes - Lecture 5: The Unix Programming Environment, Simson Garfinkel, Acm Computing Surveys
Document Summary
Taimur aslam, ivan krsul, and eugene h. spafford. Technical report tr-96-051, purdue university department of computer. Ieee transactions on information theory, it-22:644-654, noviembre 1976. Matthew s. hecht, abhai johri, radhakrishna aditham, and t. john wei. In usenix conference proceedings, pages 133: the usenix association, verano 1988. Richard heady, george luger, arthur maccabe, and mark servilla. Technical report cs90-20, university of new mexico, agosto 1990. Carl e. landwher, alan r. bull, john p. mcdermott, and william s. choi. A taxonomy of computer program security flaws, with examples. Annual symposium and technical displays on physical and electronic security, 1990. Svr4 may become the first truly secure unix. Cryptographic support for secure logs on untrusted machines. In proceedings of the 7th usenix security symposium. Keeping your site comfortably secure: an introduction to internet firewalls. La seguridad en inform tica, inform tica aplicada a la gesti n. Seguridad en el web, conceptos de acceso a la informaci n. http://cdec. unican. es/libro/seguridadcgi. htm.