Cisco flow logs and intrusion detection at the Ohio State University
Steve Roming
págs. 23-26
Invisible intruders: rootkits in practice
David Brumley
págs. 27-29
Indicators of UNIX host compromise: What intruders may do after they have root
Paul Brutch, Tasneem G. Brutch, Udo Pooch
págs. 30-35
A hacker's approach to id
Peiter Zatko
págs. 36-39
A glimpse into the future of id
Tim Bass, Dave Gruber
págs. 40-45
On reliability: security and reliability
John Sellens
págs. 46-52
© 2001-2024 Fundación Dialnet · Todos los derechos reservados
Coordinado por: