default search action
Information Security Technical Report, Volume 7
Volume 7, Number 1, March 2002
- Chez Ciechanowicz:
Introduction. 1 - Jim Mellander:
Unix Filesystem Security. 11-25 - Richard Steinberger:
Vulnerability Management in Unix Environments. 26-36 - Chris I. Dalton, Tse Huong Choo, Andrew P. Norman:
Design of Secure Unix. 37-56 - Chuck Boeckman:
Securing the Shell - Implementing a Host Level Default Deny Policy. 57-62 - Michele D. Guel:
A Framework for Choosing Your Next Generation Authentication/Authorization System. 63-78
Volume 7, Number 2, June 2002
- Chez Ciechanowicz:
Introduction. 1 - Yvo Desmedt:
Is there a Need for Survivable Computation in Critical Infrastructures? 11-21 - Andy Jones:
Protecting the Critical National Infrastructure - Developing a Method for the Measurement of Threat Agents in an Information Environment. 22-36 - Mike Todd, Carl Colwill, Dave Allen:
Benchmarking for Critical Infrastructure Protection. 37-49 - Ádám Rák:
Information Sharing in the Cyber Age: a Key to Critical Infrastructure Protection. 50-56 - Steve Branigan:
Securing the Critical IP Infrastructure. 57-64 - Colin Whittaker:
The UK Financial Sector's Place in the Critical National Infrastructure. 65-74
Volume 7, Number 4, December 2002
- Chez Ciechanowicz:
Introduction. 1 - Yona Flink:
Who holds the key to IT security? 10-22 - Mark S. Nixon, John N. Carter, Jamie D. Shutler, Michael G. Grant:
New Advances in Automatic Gait Recognition. 23-35 - Catherine J. Tilton:
Biometric Standards - An Overview. 36-48 - Colin Soutar:
Implementation of Biometric Systems - Security and Privacy Considerations. 49-55 - Stephanie A. C. Schuckers:
Spoofing and Anti-Spoofing Measures. 56-62
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.