![]() | Name | Last modified | Size | Description |
---|---|---|---|---|
![]() | Parent Directory | - | ||
![]() | 1986 - How To Write a Setuid Program.pdf | 2019-03-07 18:22 | 37K | |
![]() | 1996 - UNIX Security - Writing Secure Programs.pdf | 2019-03-07 18:22 | 1.2M | |
![]() | 1987 - Sharing Accounts.pdf | 2019-03-07 18:22 | 84K | |
![]() | 1991 - Comparing Authentication Techniques.pdf | 2019-03-07 18:22 | 45K | |
![]() | 1992 - Anatomy of a Proactive Password Changer.pdf | 2019-03-07 18:22 | 40K | |
![]() | 1993 - Teaching Computer Security.pdf | 2019-03-07 18:22 | 31K | |
![]() | 1995 - A Standard Audit Trail Format.pdf | 2019-03-07 18:22 | 51K | |
![]() | 1997 - Writing Safe Setuid Programs.pdf | 2019-03-07 18:22 | 85K | |
![]() | 1998 - Robust Programming.pdf | 2019-03-07 18:22 | 64K | |
![]() | 1999 - Vulnerabilities Analysis.pdf | 2019-03-07 18:22 | 44K | |
![]() | 2000 - Education in Information Security.pdf | 2019-03-07 18:22 | 32K | |
![]() | 2003 - Secure Programming for Linux and Unix HowTo.pdf | 2019-03-07 18:22 | 674K | |