| lira.epac.to |
/DOCS-TECH/Security |
ICMP Usage in Scanning - The Complete Know-How - v3.0.pdf | 5.4 MB | 2019-03-07 18:23 | Documents |
| lira.epac.to |
/DOCS-TECH/Programming/Secure Programming |
Techniques for Trusted Software Engineering.pdf | 360.0 KB | 2019-03-07 18:23 | Documents |
| lira.epac.to |
/DOCS-TECH/Security |
Cryptology and Physical Security - Rights Amplification in Master-Keyed Mechanical Locks.pdf | 3.9 MB | 2019-03-07 18:23 | Documents |
| lira.epac.to |
/DOCS-TECH/Security |
An Introduction to Computer Security - The NIST Handbook.pdf | 1.6 MB | 2019-03-07 18:23 | Documents |
| lira.epac.to |
/DOCS-TECH/Security |
An Evening with Berferd - In Which a Cracker is Lured, Endured and Studied.pdf | 46.0 KB | 2019-03-07 18:23 | Documents |
| lira.epac.to |
/DOCS-TECH/Networking/Firewalls |
How Safe is Your Firewall - On the Security of Intranets.pdf | 46.0 KB | 2019-03-07 18:23 | Documents |
| lira.epac.to |
/DOCS-TECH/Networking/Firewalls |
The Design of a Secure Internet Gateway.pdf | 38.0 KB | 2019-03-07 18:23 | Documents |
| lira.epac.to |
/DOCS-TECH/Security/Network Security |
Strange Attractors and TCP IP Sequence Number Analysis.pdf | 1000.0 KB | 2019-03-07 18:23 | Documents |
| lira.epac.to |
/DOCS-TECH/Forensics/Incident Response |
First Response Manual.pdf | 381.0 KB | 2019-03-07 18:23 | Documents |
| lira.epac.to |
/DOCS-TECH/Math/Crypto/Libraries |
cryptlib Security Toolkit.pdf | 1.1 MB | 2019-03-07 18:22 | Documents |
| lira.epac.to |
/DOCS-TECH/Programming/Secure Programming (bishop@ucdavis.edu) |
1987 - Sharing Accounts.pdf | 84.0 KB | 2019-03-07 18:22 | Documents |
| lira.epac.to |
/DOCS-TECH/Math/Crypto/Algorithms/t-Class |
The t-Class of SOBER Stream Ciphers.pdf | 278.5 KB | 2019-03-07 18:22 | Documents |
| lira.epac.to |
/DOCS-TECH/Math/Crypto/Algorithms/t-Class |
Exploiting Multiples of the Connection Polynomial in Word-Oriented Stream Ciphers.pdf | 199.7 KB | 2019-03-07 18:22 | Documents |
| lira.epac.to |
/DOCS-TECH/Programming/Secure Programming (bishop@ucdavis.edu) |
1995 - A Standard Audit Trail Format.pdf | 51.0 KB | 2019-03-07 18:22 | Documents |
| lira.epac.to |
/DOCS-TECH/Math/Crypto/Algorithms/Turing |
Turing - A Fast Software Stream Cipher.pdf | 276.5 KB | 2019-03-07 18:22 | Documents |
| lira.epac.to |
/DOCS-TECH/Math/Crypto/Algorithms/Skipjack |
SKIPJACK - Annex - Test Vectors.pdf | 420.9 KB | 2019-03-07 18:22 | Documents |
| lira.epac.to |
/DOCS-TECH/Programming/Secure Programming (bishop@ucdavis.edu) |
1986 - How To Write a Setuid Program.pdf | 37.0 KB | 2019-03-07 18:22 | Documents |
| lira.epac.to |
/DOCS-TECH/Math/Crypto/Algorithms/Square |
The SQUARE Block Cipher.pdf | 319.5 KB | 2019-03-07 18:22 | Documents |
| lira.epac.to |
/DOCS-TECH/Math/Crypto/Algorithms/PSEC |
Specification of PSEC - Provably Secure Elliptic Curve Encryption Scheme.pdf | 191.5 KB | 2019-03-07 18:22 | Documents |
| lira.epac.to |
/DOCS-TECH/Math/Crypto/Algorithms/PSEC |
Self Evaluation of PSEC - Provably Secure Elliptic Curve Encryption Scheme.pdf | 299.0 KB | 2019-03-07 18:22 | Documents |
| lira.epac.to |
/DOCS-TECH/Math/Crypto/Algorithms/Skipjack |
SKIPJACK and KEA Algorithms Specifications.pdf | 838.7 KB | 2019-03-07 18:22 | Documents |
| lira.epac.to |
/DOCS-TECH/Programming/Secure Programming (bishop@ucdavis.edu) |
2000 - Education in Information Security.pdf | 32.0 KB | 2019-03-07 18:22 | Documents |
| lira.epac.to |
/DOCS-TECH/Math/Crypto/Libraries |
OpenCL 0.7.1.pdf | 175.0 KB | 2019-03-07 18:22 | Documents |
| lira.epac.to |
/DOCS-TECH/Engineering and Management/Software Engineering |
Large-Scale Software Architecture.pdf | 4.6 MB | 2019-03-07 18:22 | Documents |
| lira.epac.to |
/DOCS-TECH/Math/Crypto/Algorithms/Loki97 |
Weaknesses in Loki97.pdf | 82.9 KB | 2019-03-07 18:22 | Documents |