| File Name ↓ | File Size ↓ | Date ↓ |
|---|---|---|
| Parent directory/ | - | - |
| 1986 - How To Write a Setuid Program.pdf | 36.8 KiB | 2019-Mar-07 17:22 |
| 1987 - Sharing Accounts.pdf | 84.2 KiB | 2019-Mar-07 17:22 |
| 1991 - Comparing Authentication Techniques.pdf | 44.6 KiB | 2019-Mar-07 17:22 |
| 1992 - Anatomy of a Proactive Password Changer.pdf | 39.8 KiB | 2019-Mar-07 17:22 |
| 1993 - Teaching Computer Security.pdf | 31.3 KiB | 2019-Mar-07 17:22 |
| 1995 - A Standard Audit Trail Format.pdf | 50.9 KiB | 2019-Mar-07 17:22 |
| 1996 - UNIX Security - Writing Secure Programs.pdf | 1.2 MiB | 2019-Mar-07 17:22 |
| 1997 - Writing Safe Setuid Programs.pdf | 84.6 KiB | 2019-Mar-07 17:22 |
| 1998 - Robust Programming.pdf | 64.2 KiB | 2019-Mar-07 17:22 |
| 1999 - Vulnerabilities Analysis.pdf | 44.1 KiB | 2019-Mar-07 17:22 |
| 2000 - Education in Information Security.pdf | 31.9 KiB | 2019-Mar-07 17:22 |
| 2003 - Secure Programming for Linux and Unix Ho..> | 673.9 KiB | 2019-Mar-07 17:22 |