Name | Last modified | Size | Description | |
---|---|---|---|---|
Parent Directory | - | |||
1986 - How To Write a Setuid Program.pdf | 2019-03-07 18:22 | 37K | ||
1987 - Sharing Accounts.pdf | 2019-03-07 18:22 | 84K | ||
1991 - Comparing Authentication Techniques.pdf | 2019-03-07 18:22 | 45K | ||
1992 - Anatomy of a Proactive Password Changer.pdf | 2019-03-07 18:22 | 40K | ||
1993 - Teaching Computer Security.pdf | 2019-03-07 18:22 | 31K | ||
1995 - A Standard Audit Trail Format.pdf | 2019-03-07 18:22 | 51K | ||
1996 - UNIX Security - Writing Secure Programs.pdf | 2019-03-07 18:22 | 1.2M | ||
1997 - Writing Safe Setuid Programs.pdf | 2019-03-07 18:22 | 85K | ||
1998 - Robust Programming.pdf | 2019-03-07 18:22 | 64K | ||
1999 - Vulnerabilities Analysis.pdf | 2019-03-07 18:22 | 44K | ||
2000 - Education in Information Security.pdf | 2019-03-07 18:22 | 32K | ||
2003 - Secure Programming for Linux and Unix HowTo.pdf | 2019-03-07 18:22 | 674K | ||