[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Johnson, 2000 - Google Patents

Problems in computer security for commercial systems

Johnson, 2000

Document ID
84899558080075913
Author
Johnson Z
Publication year

External Links

Snippet

This thesis looks at some of the problems involved in securing a commercial operating system against attack from hostile users. With the increasing complexity of such systems, and their vulnerability when connected to the Internet, it investigates the question,“Can …
Continue reading at search.proquest.com (other versions)

Similar Documents

Publication Publication Date Title
CN114978584B (en) Network security protection security method and system based on unit units
Lampson Computer security in the real world
US7398389B2 (en) Kernel-based network security infrastructure
EP0787397B1 (en) System and method for providing secure internetwork services
Ryutov et al. Integrated access control and intrusion detection for web servers
Kesh et al. A framework for analyzing e‐commerce security
US20030177376A1 (en) Framework for maintaining information security in computer networks
Longstaff et al. Security of the Internet
WO2005029249A2 (en) Secure network system and associated method of use
Olovsson A structured approach to computer security
Stefanek Information security best practices: 205 basic rules
Johnson Problems in computer security for commercial systems
Mookhey et al. Linux: Security, Audit and Control Features
Ellis et al. Security of the Internet
Wyatt et al. Secure Messaging Scenarios with WebSphere MQ
Ismail Instrumentation of an intrusion detection system in a cluster environment
Butler Computer Security in the Real World
Allen et al. Securing Network Servers
Terkelsen Data collection on security flaws caused by design errors
Shim Developing a probabilistic security measure using a software reliability model
FIREWALL MILKYWAY NETWORKS BLACK HOLE FIREWALL
Fuller et al. Fedora Documentation 18 Security Guide
Beier et al. Information system security best practices for UOCAVA-supporting systems
Okoronkwo Survey on the Network Security Incidents
Persson A Comparative Study of Security Features in FreeBSD and OpenBSD