Two papers on softupdates
softupdates techniques.
http://www.usenix.org/publications/library/proceedings/usenix99/mckusick.html
journaling vs softupdates
http://www.usenix.org/publications/library/proceedings/usenix2000/general/seltzer.html
How to conduct a vulnerability assessment
-
The realm of information security is fraught with jargon, as anyone who has
come across vulnerability-related terms can tell you. To complicate matters
f...
15 minutes ago
No comments:
Post a Comment