Login / Signup
Ups and Downs of UNIX/Linux Host-Based Security Solutions.
Anton Chuvakin
Published in:
login Usenix Mag. (2003)
Keyphrases
</>
operating system
command line
windows nt
microsoft windows
access control
intrusion detection
information security
security requirements
statistical databases
security mechanisms
security issues
network security
user friendly
open source
data security
optimal solution
security protocols
smart card