HOME | MY ACCOUNT | POWER SEARCH | REGISTER | MEMBER LIST | SUGGEST CATEGORY



Top > Security > FAQs, Help, and Tutorials

FAQs, Help, and Tutorials

Sort By :
This report, written as a case study, presents results of a detailed information security audit of UNIX systems that belong to a fictitious company. It illustrates an approach to performing such an examination.
Category:

Random Site Quote: This report presents results of a detailed information security audit of UNIX systems that belong to a fictitious company. It illustrates an approach to performing such an examination.
Other versions of this article: Auditing UNIX Systems: A Case Study This report presents results of a detailed security audit of UNIX systems belonging to a fictitious company. It describes discovered vulnerabilities and proposes a prioritized roadmap for addressing them. Any similarities to an

Date Added: Jun 2, 2009 Hits: Rating: 0.00 Votes: 0

Member Reviews Visitor Ratings Google PR

Online book on software security tips.
Category:

Random Site Quote: Secure Programming for Linux and Unix HOWTO David A. Wheeler v3.010 Edition Copyright © 1999, 2000, 2001, 2002, 2003 David A. Wheeler v3.010, 3 March 2003 This book provides a set of design and implementation guidelines for writing secure programs for Linux and Unix systems. Such programs
For detailed information visit the website, please...

Date Added: Jun 2, 2009 Hits: Rating: 0.00 Votes: 0

Member Reviews Visitor Ratings Google PR

Securing FreeBSD
Category:

Random Site Quote: Command vs. Protocol: Throughout this document, we will use bold text to refer to an application, and a monospaced font to refer to specific commands. Protocols will use a normal font. This typographical distinction is useful for instances such as ssh, since it is a protocol as well as command.
For detailed information visit the website, please...

Date Added: Jun 2, 2009 Hits: Rating: 0.00 Votes: 0

Member Reviews Visitor Ratings Google PR

The Computer Security Evaluation Frequently Asked Questions (V2.1)
Category:

Random Site Quote: Computer Security Evaluation FAQ, Version 2.1 From: Trusted Product Evaluation Program Subject: Computer Security Evaluation FAQ, Version 2.1 Date: 18 Feb 1998 11:03:28 GMT X-Last-Updated: 1996/08/13 Posting-Frequency: monthly Archive-name: computer-security/evaluations The Computer Security
For detailed information visit the website, please...

Date Added: Jun 2, 2009 Hits: Rating: 0.00 Votes: 0

Member Reviews Visitor Ratings Google PR


Pages: [< Previous] 1 2

Category Jump :
Popular Tags


Main Category
Pagerank Statistics
PR 8
1 site(s)
PR 7
1 site(s)
PR 6
7 site(s)
PR 5
7 site(s)
PR 4
9 site(s)
PR 3
9 site(s)

Directory Statistics

Links: 698
Categories: 118


Top 10