Reid, 1995 - Google Patents
Open systems security: Traps and pitfallsReid, 1995
- Document ID
- 6150255530681969678
- Author
- Reid J
- Publication year
- Publication venue
- Computers & Security
External Links
Snippet
A number of security problems affecting open systems are discussed in this paper, covering vendor supplied software, vulnerabilities in subsystems, password integrity and general security issues. Problems with the Internet protocol suite are also described. The paper …
- 235000010384 tocopherol 0 abstract description 21
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Kendall | A database of computer attacks for the evaluation of intrusion detection systems | |
| Scambray et al. | Hacking exposed: network security secrets & solutions | |
| McClure et al. | Hacking exposed: network security secrets and solutions | |
| US10057295B2 (en) | System and method for providing network and computer firewall protection with dynamic address isolation to a device | |
| Bellovin | There be dragons | |
| Harris et al. | TCP/IP security threats and attack methods | |
| Lockhart | Network Security Hacks: Tips & Tools for Protecting Your Privacy | |
| US20090222907A1 (en) | Data and a computer system protecting method and device | |
| CN116471121A (en) | Security defense method, gateway proxy device and storage medium | |
| Mohammadzad et al. | Using rootkits hiding techniques to conceal honeypot functionality | |
| Barrett et al. | Linux security cookbook | |
| Reid | Open systems security: Traps and pitfalls | |
| Fenzi et al. | Linux security HOWTO | |
| Maybaum et al. | Technical methods, techniques, tools and effects of cyber operations | |
| Haletky | VmWare vSphere and virtual infrastructure security: Securing the virtual environment | |
| Karamanos | Investigation of home router security | |
| Lukatsky et al. | Protect your information with intrusion detection | |
| Davis | Securing and controlling Cisco routers | |
| Wilson | Hacking: the basics | |
| Monteiro | How intrusion detection can improve software decoy applications | |
| Burgiss | Security Quick− Start HOWTO for Linux | |
| WO2006092785A2 (en) | Method and apparatus for the dynamic defensive masquerading of computing resources | |
| Rosenberry | Protecting Your Corporate Network from Your Employee's Home Systems | |
| Tapiador | Vulnerabilities and Attacks | |
| Harrison et al. | A protocol layer survey of network security |