| lira.epac.to |
/DOCS-TECH/Retro Archives/Historical Publications Archive/1999 |
Evaluating Intrusion Detection Systems: - The 1998 DARPA Off-line Intrusion Detection Evaluation (1999).pdf | 326.0 KB | 2019-03-07 18:39 | Documents |
| lira.epac.to |
/DOCS-TECH/Retro Archives/Historical Publications Archive/1998 |
The Development and Analysis of Intrusion Detection Algorithms (1998).pdf | 1.2 MB | 2019-03-07 18:39 | Documents |
| lira.epac.to |
/DOCS-TECH/Security/Oracle |
A Security Checklist for Oracle9i.pdf | 50.0 KB | 2019-03-07 18:39 | Documents |
| lira.epac.to |
/DOCS-TECH/Retro Archives/Historical Publications Archive/1999 |
Active Network Security (1999).pdf | 674.0 KB | 2019-03-07 18:39 | Documents |
| lira.epac.to |
/DOCS-TECH/Retro Archives/Historical Publications Archive/1998 |
Placing Backdoors through Firewalls (1998).pdf | 22.0 KB | 2019-03-07 18:39 | Documents |
| lira.epac.to |
/DOCS-TECH/Retro Archives/Historical Publications Archive/2003 |
Filtering Malware and Spam with Postfix (2003).pdf | 25.0 KB | 2019-03-07 18:39 | Documents |
| lira.epac.to |
/DOCS-TECH/Retro Archives/Historical Publications Archive/2002 |
Forensic Analysis Without an IDS - A Detailed Account of Blind Incident Response (2002).pdf | 507.0 KB | 2019-03-07 18:39 | Documents |
| lira.epac.to |
/DOCS-TECH/Retro Archives/Historical Publications Archive/2001 |
Using Network Management Systems to Detect Distributed Denial of Service Attacks (2001).pdf | 1000.0 KB | 2019-03-07 18:39 | Documents |
| lira.epac.to |
/DOCS-TECH/Retro Archives/Historical Publications Archive/2002 |
Dissecting Distributed Malware Networks (2002).pdf | 471.0 KB | 2019-03-07 18:39 | Documents |
| lira.epac.to |
/DOCS-TECH/Retro Archives/Historical Publications Archive/1994 |
An Introduction to Shell Programming (1994).pdf | 171.0 KB | 2019-03-07 18:39 | Documents |
| lira.epac.to |
/DOCS-TECH/Retro Archives/Historical Publications Archive/2001 |
Using Embedded Auditors for Intrusion Detection Systems (2001).pdf | 441.0 KB | 2019-03-07 18:39 | Documents |
| lira.epac.to |
/DOCS-TECH/Retro Archives/Historical Publications Archive/1995 |
Audit Log Analysis using the Visual Audit Browser Toolkit (1995).pdf | 57.0 KB | 2019-03-07 18:39 | Documents |
| lira.epac.to |
/DOCS-TECH/Retro Archives/Historical Publications Archive/2002 |
IP Protocol 11 (NVP) Backdoor Tool (2002).pdf | 242.0 KB | 2019-03-07 18:39 | Documents |
| lira.epac.to |
/DOCS-TECH/Retro Archives/Historical Publications Archive/1988 |
The Internet Worm Program - An Analysis (1988).pdf | 196.0 KB | 2019-03-07 18:39 | Documents |
| lira.epac.to |
/DOCS-TECH/Retro Archives/Historical Publications Archive/1996 |
IDIOT - Users Guide (1996).pdf | 263.0 KB | 2019-03-07 18:39 | Documents |
| lira.epac.to |
/DOCS-TECH/Retro Archives/Historical Publications Archive/2000 |
Results of the Security in ActiveX Workshop (2000).pdf | 519.0 KB | 2019-03-07 18:39 | Documents |
| lira.epac.to |
/DOCS-TECH/Retro Archives/Historical Publications Archive/2002 |
Fast Forensics for Busy Administrators (2002).pdf | 506.0 KB | 2019-03-07 18:39 | Documents |
| lira.epac.to |
/DOCS-TECH/Retro Archives/Historical Publications Archive/2003 |
Dropbear SSH Server Format String Vulnerability (2003).pdf | 12.0 KB | 2019-03-07 18:39 | Documents |
| lira.epac.to |
/DOCS-TECH/Retro Archives/Historical Publications Archive/2001 |
SSH CRC Exploit Analysis (2001).pdf | 374.0 KB | 2019-03-07 18:39 | Documents |
| lira.epac.to |
/DOCS-TECH/Retro Archives/Historical Publications Archive/1984 |
A Unique Examination of the Buffer Overflow Condition (1984).pdf | 2.5 MB | 2019-03-07 18:39 | Documents |
| lira.epac.to |
/DOCS-TECH/Retro Archives/Historical Publications Archive/2003 |
IMAP-ftp - IMAP Based FTP Like Access (2003).pdf | 12.0 KB | 2019-03-07 18:39 | Documents |
| lira.epac.to |
/DOCS-TECH/Retro Archives/Historical Publications Archive/1998 |
Evaluating Intrusion Detection Systems without Attacking your Friends - The 1998 DARPA Intrusion Detection Evaluation (1998).pdf | 70.0 KB | 2019-03-07 18:39 | Documents |
| lira.epac.to |
/DOCS-TECH/Algoritmi/Computation Theory and Complexity |
The Computational Complexity of Machine Learning.pdf | 777.0 KB | 2019-03-07 18:38 | Documents |
| lira.epac.to |
/DOCS-TECH/Algoritmi/Computation Theory and Complexity |
Parallel Complexity Theory.pdf | 8.6 MB | 2019-03-07 18:38 | Documents |
| lira.epac.to |
/DOCS-TECH/Retro Archives/Historical Publications Archive/2001 |
Microsoft IIS - Unicode Exploit (2001).pdf | 347.0 KB | 2019-03-07 18:38 | Documents |