+

Reid, 1995 - Google Patents

Open systems security: Traps and pitfalls

Reid, 1995

Document ID
6150255530681969678
Author
Reid J
Publication year
Publication venue
Computers & Security

External Links

Snippet

A number of security problems affecting open systems are discussed in this paper, covering vendor supplied software, vulnerabilities in subsystems, password integrity and general security issues. Problems with the Internet protocol suite are also described. The paper …
Continue reading at www.sciencedirect.com (other versions)

Similar Documents

Publication Publication Date Title
Kendall A database of computer attacks for the evaluation of intrusion detection systems
Scambray et al. Hacking exposed: network security secrets & solutions
McClure et al. Hacking exposed: network security secrets and solutions
US10057295B2 (en) System and method for providing network and computer firewall protection with dynamic address isolation to a device
Bellovin There be dragons
Harris et al. TCP/IP security threats and attack methods
Lockhart Network Security Hacks: Tips & Tools for Protecting Your Privacy
US20090222907A1 (en) Data and a computer system protecting method and device
CN116471121A (en) Security defense method, gateway proxy device and storage medium
Mohammadzad et al. Using rootkits hiding techniques to conceal honeypot functionality
Barrett et al. Linux security cookbook
Reid Open systems security: Traps and pitfalls
Fenzi et al. Linux security HOWTO
Maybaum et al. Technical methods, techniques, tools and effects of cyber operations
Haletky VmWare vSphere and virtual infrastructure security: Securing the virtual environment
Karamanos Investigation of home router security
Lukatsky et al. Protect your information with intrusion detection
Davis Securing and controlling Cisco routers
Wilson Hacking: the basics
Monteiro How intrusion detection can improve software decoy applications
Burgiss Security Quick− Start HOWTO for Linux
WO2006092785A2 (en) Method and apparatus for the dynamic defensive masquerading of computing resources
Rosenberry Protecting Your Corporate Network from Your Employee's Home Systems
Tapiador Vulnerabilities and Attacks
Harrison et al. A protocol layer survey of network security
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载