Publisher
Springer International Publishing
Reference40 articles.
1. J. P. Anderson. Computer Security Technology Planning Study (Vol. I and II, “Anderson report”). James P. Anderson and Co., Fort Washington, PA, USA, Oct 1972.
2. S. M. Bellovin. Thinking Security: Stopping Next Year’s Hackers. Addison-Wesley, 2016.
3. H. Chen, D. Wagner, and D. Dean. Setuid demystified. In USENIX Security, 2002.
4. D. A. Curry. UNIX System Security: A Guide for Users and System Administrators. Addison-Wesley, 1992.
5. R. C. Daley and P. G. Neumann. A general-purpose file system for secondary storage. In AFIPS Fall Joint Computer Conference, pages 213–229, Nov 1965.