-
1
-
-
84857118693
-
-
Norton AntiVirus. http://www.symantec.com/ avcenter.
-
Norton AntiVirus
-
-
-
2
-
-
39049122183
-
-
Spybot. http://www.safer-networking.org/en.
-
Spybot
-
-
-
3
-
-
0346236349
-
-
Art and Science. Addison-Wesley
-
M. Bishop. Computer Security: Art and Science. Addison-Wesley, 2003.
-
(2003)
Computer Security
-
-
Bishop, M.1
-
5
-
-
85084160792
-
Understanding data lifetime via whole system simulation
-
Aug
-
J. Chow, B. Pfaff, T. Garfinkel, K. Christopher, and M. Rosenblum. Understanding data lifetime via whole system simulation. In Proceedings of the USENIX Security Symposium, Aug. 2004.
-
(2004)
Proceedings of the USENIX Security Symposium
-
-
Chow, J.1
Pfaff, B.2
Garfinkel, T.3
Christopher, K.4
Rosenblum, M.5
-
6
-
-
84978401615
-
Revirt: Enabling intrusion analysis through virtualmachine logging and replay
-
G. W. Dunlap, S. T. King, S. Cinar, M. Basrai, and P. M. Chen. Revirt: Enabling intrusion analysis through virtualmachine logging and replay. In Proceedings of the 2002 Symposium on Operating Systems Design and Implementation (OSDI), 2002.
-
(2002)
Proceedings of the 2002 Symposium on Operating Systems Design and Implementation (OSDI)
-
-
Dunlap, G.W.1
King, S.T.2
Cinar, S.3
Basrai, M.4
Chen, P.M.5
-
7
-
-
33845387415
-
The taser intrusion recovery system
-
New York, NY, USA, ACM Press
-
A. Goel, K. Po, K. Farhadi, Z. Li, and E. de Lara. The taser intrusion recovery system. In SOSP '05: Proceedings of the twentieth ACM symposium on Operating systems principles, pages 163-176, New York, NY, USA, 2005. ACM Press.
-
(2005)
SOSP '05: Proceedings of the twentieth ACM symposium on Operating systems principles
, pp. 163-176
-
-
Goel, A.1
Po, K.2
Farhadi, K.3
Li, Z.4
de Lara, E.5
-
16
-
-
0004015896
-
Recovery-oriented computing (roc): Motivation, definition, techniques, and case studies
-
Technical Report UCB//CSD-02-1175, UC Berkeley Computer Science, 2002
-
D. A. Patterson, A. Brown, P. Broadwell, G. Candea, M. Chen, J. Cutler, P. Enriquez, A. Fox, E. Kiciman, M. Merzbacher, D. Oppenheimer, N. Sastry, W. Tetzlaff, J. Traupman, and N. Treuhaft. Recovery-oriented computing (roc): Motivation, definition, techniques, and case studies. Technical Report UCB//CSD-02-1175, UC Berkeley Computer Science, 2002.
-
-
-
Patterson, D.A.1
Brown, A.2
Broadwell, P.3
Candea, G.4
Chen, M.5
Cutler, J.6
Enriquez, P.7
Fox, A.8
Kiciman, E.9
Merzbacher, M.10
Oppenheimer, D.11
Sastry, N.12
Tetzlaff, W.13
Traupman, J.14
Treuhaft, N.15
-
17
-
-
0026812659
-
The design and implementation of a log-structured file system
-
M. Rosenblum and J. K. Ousterhout. The design and implementation of a log-structured file system. ACM Transactions on Computer Systems, 10(1):26-52, 1992.
-
(1992)
ACM Transactions on Computer Systems
, vol.10
, Issue.1
, pp. 26-52
-
-
Rosenblum, M.1
Ousterhout, J.K.2
-
18
-
-
19944423977
-
The protection of information in computer systems
-
J. Saltzer and M. Schroeder. The protection of information in computer systems. Communications of the ACM, 17(7), 1974.
-
(1974)
Communications of the ACM
, vol.17
, Issue.7
-
-
Saltzer, J.1
Schroeder, M.2
-
21
-
-
2942539687
-
-
Addison-Wesley, Upper Saddle River, NJ, 1st edition
-
Sven B. Shcreiber. Undocumented Windows 2000 Secrets: A Programmer's Cookbook, volume 1. Addison-Wesley, Upper Saddle River, NJ, 1st edition, 2001.
-
(2001)
Undocumented Windows 2000 Secrets: A Programmer's Cookbook
, vol.1
-
-
Shcreiber, S.B.1
|