Index of /sites/ftp.wiretapped.net/pub/security/development/secure-programming/

Icon  Name                                                                                                             Last modified      Size  
[PARENTDIR] Parent Directory - [   ] 1996-sans-tut.pdf 2000-12-29 12:00 1.2M [   ] Secure-Programs-HOWTO-all-html.tar.gz 2003-03-03 12:00 270K [   ] Secure-Programs-HOWTO.pdf 2003-03-03 12:00 674K [   ] bishop-1979-the-transfer-of-information-and-authority-in-a-protection-system.pdf 2003-03-04 12:00 710K [   ] bishop-1986-access-control-and-privacy-in-large-distributed-systems.pdf 2003-03-04 12:00 299K [   ] bishop-1986-how-to-write-a-setuid-program.pdf 2003-03-04 12:00 37K [   ] bishop-1987-sharing-accounts.pdf 2003-03-04 12:00 84K [   ] bishop-1991-comparing-authentication-techniques.pdf 2003-03-04 12:00 45K [   ] bishop-1992-anatomy-of-a-proactive-password-changer.pdf 2003-03-04 12:00 40K [   ] bishop-1993-teaching-computer-security.pdf 2003-03-04 12:00 31K [   ] bishop-1995-a-standard-audit-trail-format.pdf 2003-03-04 12:00 51K [   ] bishop-1995-improving-system-security-via-proactive-password-checking.pdf 2003-03-04 12:00 57K [   ] bishop-1996-writing-secure-programs.pdf 2000-12-29 12:00 1.2M [   ] bishop-1997-computer-security-in-introductory-programming-classes.pdf 2003-03-04 12:00 7.8K [   ] bishop-1997-property-based-testing-a-new-approach-to-testing-for-assurance.pdf 2003-03-04 12:00 178K [   ] bishop-1997-the-state-of-infosec-education-in-academia-present-and-future-directions.pdf 2003-03-04 12:00 40K [   ] bishop-1997-writing-safe-setuid-programs.pdf 2001-10-03 12:00 85K [   ] bishop-1998-robust-programming.pdf 2000-08-17 12:00 64K [   ] bishop-1999-vulnerabilities-analysis.pdf 2003-03-04 12:00 44K [   ] bishop-2000-academia-and-education-in-information-security-four-years-later.pdf 2003-03-04 12:00 84K [   ] bishop-2000-education-in-information-security.pdf 2003-03-04 12:00 32K [   ] bishop-2001-how-attackers-break-programs-and-how-to-write-programs-more-securely.pdf 2003-03-04 12:00 586K [   ] bishop-dilger-1996-checking-for-race-conditions-in-file-accesses.pdf 2003-03-04 12:00 53K [TXT] delivering-signals-for-fun-and-profit.txt 2001-05-28 12:00 20K [   ] devanbu-et-al-1998-techniques-for-trusted-software-engineering.pdf 1998-06-07 12:00 360K [   ] gilliam-et-al-2000-reducing-software-security-risk-through-an-integrated-approach.pdf 2003-03-04 12:00 76K [   ] gilliam-et-al-2001-development-of-a-software-security-assessment-instrument-to-reduce-software-security-risk.pdf 2003-03-04 12:00 76K [   ] hashii-et-al-2000-supporting-reconfigurable-security-policies-for-mobile-programs.pdf 2003-03-04 12:00 206K [   ] haugh-bishop-2003-testing-c-programs-for-buffer-overflow-vulnerabilities.pdf 2003-02-12 12:00 97K [   ] peterson-et-al-2002-a-flexible-containment-mechanism-for-executing-untrusted-code.pdf 2003-03-04 12:00 158K [TXT] safe-cgi.txt 1997-10-28 12:00 13K [TXT] secure-unix-programming-faq.txt 2008-02-09 21:26 0