Nyílt forrású, mobiltelefonos játékok az oktatásban
UMI Error Messages Solaris
Linux Networking Commands
Kernel Module Howto
1 Figure 6-16: Advanced Server Hardening Techniques Reading Event Logs (Chapter 10) The importance of logging to diagnose problems Failed logins, changing.
1 Intrusion Detection Methods “Intrusion detection is the process of identifying and responding to malicious activity targeted at computing and networking.
1 Procedures in Intrusion Investigation of a UNIX/Linux Host CS-585F: Computer-Related Law and Computer Forensics Fall 2002 By Yu-Li Chen Rajesh Menon.
System Call
Week Twelve Agenda
Intrusion Detection Methods
Status of Embedded Linux
CIT 470: Advanced Network and System Administration