Index of ftp://static.zedz.net/pub/security/info/papers/secure-programming/

[DIR] Parent Directory

-15 -14 -13 -12 -11 -10 -09 -08 -07 -06 -05 -04 -03 -02 -01   page 01 of 02
+01 +02 +03 +04 +05 +06 +07 +08 +09 +10 +11 +12 +13 +14 +15   <- Back | Next page ->

[LNK] 1996-sans-tut.pdf  39.00b  May 21 2013
[ GZ] Secure-Programs-HOWTO-all-html.tar.gz  269.62Kb  March 3 2003
[TXT] Secure-Programs-HOWTO.pdf  673.85Kb  March 3 2003
[TXT] bishop-1979-the-transfer-of-information-and-authority-in-a-protection-system.pdf  710.35Kb  March 4 2003
[TXT] bishop-1986-access-control-and-privacy-in-large-distributed-systems.pdf  298.63Kb  March 4 2003
[TXT] bishop-1986-how-to-write-a-setuid-program.pdf  36.80Kb  March 4 2003
[TXT] bishop-1987-sharing-accounts.pdf  84.17Kb  March 4 2003
[TXT] bishop-1991-comparing-authentication-techniques.pdf  44.60Kb  March 4 2003
[TXT] bishop-1992-anatomy-of-a-proactive-password-changer.pdf  39.78Kb  March 4 2003
[TXT] bishop-1993-teaching-computer-security.pdf  31.32Kb  March 4 2003
[TXT] bishop-1995-a-standard-audit-trail-format.pdf  50.89Kb  March 4 2003
[TXT] bishop-1995-improving-system-security-via-proactive-password-checking.pdf  56.61Kb  March 4 2003
[TXT] bishop-1996-writing-secure-programs.pdf  1.16Mb  December 29 2000
[TXT] bishop-1997-computer-security-in-introductory-programming-classes.pdf  7.81Kb  March 4 2003
[TXT] bishop-1997-property-based-testing-a-new-approach-to-testing-for-assurance.pdf  178.28Kb  March 4 2003
[TXT] bishop-1997-the-state-of-infosec-education-in-academia-present-and-future-directions.pdf  39.53Kb  March 4 2003
[TXT] bishop-1997-writing-safe-setuid-programs.pdf  84.58Kb  October 3 2001
[TXT] bishop-1998-robust-programming.pdf  64.16Kb  August 17 2000
[TXT] bishop-1999-vulnerabilities-analysis.pdf  44.14Kb  March 4 2003
[TXT] bishop-2000-academia-and-education-in-information-security-four-years-later.pdf  83.90Kb  March 4 2003
[TXT] bishop-2000-education-in-information-security.pdf  31.91Kb  March 4 2003
[TXT] bishop-2001-how-attackers-break-programs-and-how-to-write-programs-more-securely.pdf  585.84Kb  March 4 2003
[TXT] bishop-dilger-1996-checking-for-race-conditions-in-file-accesses.pdf  52.64Kb  March 4 2003
[TXT] delivering-signals-for-fun-and-profit.txt  20.25Kb  May 28 2001
[TXT] devanbu-et-al-1998-techniques-for-trusted-software-engineering.pdf  360.14Kb  June 7 1998
[TXT] gilliam-et-al-2000-reducing-software-security-risk-through-an-integrated-approach.pdf  75.55Kb  March 4 2003
[TXT] gilliam-et-al-2001-development-of-a-software-security-assessment-instrument-to-reduce-software-security-risk.pdf  75.55Kb  March 4 2003
[TXT] hashii-et-al-2000-supporting-reconfigurable-security-policies-for-mobile-programs.pdf  206.10Kb  March 4 2003
[TXT] haugh-bishop-2003-testing-c-programs-for-buffer-overflow-vulnerabilities.pdf  97.19Kb  February 12 2003
[TXT] peterson-et-al-2002-a-flexible-containment-mechanism-for-executing-untrusted-code.pdf  157.94Kb  March 4 2003

-15 -14 -13 -12 -11 -10 -09 -08 -07 -06 -05 -04 -03 -02 -01   page 01 of 02
+01 +02 +03 +04 +05 +06 +07 +08 +09 +10 +11 +12 +13 +14 +15   <- Back | Next page ->