UP - logo

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources UPUK. For full access, REGISTER.

1
hits: 3
1.
  • Understanding Linux File Pe... Understanding Linux File Permissions
    Linux, 01/2015
    Book Chapter

    The Linux system follows the Unix method of file permissions, allowing individual users and groups access to files based on a set of security settings for each file and directory. This chapter ...
Full text
2.
  • A security monitoring metho... A security monitoring method for malicious P2P event detection
    Jung, Hyun Mi; Hwang, Il-Sun; Moon, Jeong-Kyung ... Peer-to-peer networking and applications, 05/2016, Volume: 9, Issue: 3
    Journal Article
    Peer reviewed

    Recently malicious code is spreading rapidly due to the use of P2P(peer to peer) file sharing. The malicious code distributed mostly transformed the infected PC as a botnet for various attacks by ...
Full text
3.
Full text

PDF

Load filters