Welcome, visitor! [ Login

Listings tagged with 'Selling' (10)

 

L. Wang and B. S. Zhou, “The study of enterprise model,” Computer Engineeri...

L. Wang and B. S. Zhou, “The study of enterprise model,” Computer Engineering and Application, 1002– 8331–(2001)12–0005–05. **”L. Wang and B. S. Zhou, “The study […]

No views yet

 

Workflow Management Coalition, “Workflow management coalition terminology a...

Workflow Management Coalition, “Workflow management coalition terminology and glossary,” Technical Report, WfMCTC–1011, Brussels: Workflow Management Coalition, 1996. None

No views yet

 

R. P. Lippmann, D. J. Fried, I. Graf, et al., “Evaluating intrusion detecti...

R. P. Lippmann, D. J. Fried, I. Graf, et al., “Evaluating intrusion detection systems: The 1998 DARPA offline intrusion detection evaluation,” in: Proceedings of the […]

1 total views, 1 today

 

SANS Institute: Lion worm. http://www.sans.o-rg/y2k/ lion.htm.

SANS Institute: Lion worm. http://www.sans.o-rg/y2k/ lion.htm. **SANS Institute: Lion worm. http://www.sans.o-rg/y2k/ lion.htm.** — When you see a cryptic line like “SANS Institute: Lion worm. http://www.sans.o-rg/y2k/ […]

1 total views, 1 today

 

Viruslist.com: Net-Worm. Linux. Adm. http://www.viruslist.com/en/viruses/en...

Viruslist.com: Net-Worm. Linux. Adm. http://www.viruslist.com/en/viruses/encyclopedia?virusid=23854. Okay, let’s tackle this query. The user wants a blog post based on that specific quote. First, I need to […]

No views yet

 

C. CAN-2003-0245. Apache apr-psprintf memory corruption vulnerability. http...

C. CAN-2003-0245. Apache apr-psprintf memory corruption vulnerability. http://www.securityfocus.com/bi-d/7723/ discussion/. **C. CAN-2003-0245. Apache apr‑psprintf memory corruption vulnerability. http://www.securityfocus.com/bi‑d/7723/ discussion/.** — When it comes to web server […]

1 total views, 1 today

 

Symantec Security Response: CodeRed Worm. http://www. sarc.com/avcenter/ven...

Symantec Security Response: CodeRed Worm. http://www. sarc.com/avcenter/venc/data/codered.worm.html. Okay, I need to write a blog post based on the quote provided. The title of the post […]

2 total views, 2 today

 

J. Xu, P. Ning, C. Kil, Y. Zhai, and C. Bookholt, “Automatic diagnosis and ...

J. Xu, P. Ning, C. Kil, Y. Zhai, and C. Bookholt, “Automatic diagnosis and response to memory corruption vulnerabilities,” in: Proceedings of the ACM CCS […]

2 total views, 2 today

 

J. R. Crandall, Su Zhen Dong, S. F. Wu, and F. T. Chong, “On deriving unkno...

J. R. Crandall, Su Zhen Dong, S. F. Wu, and F. T. Chong, “On deriving unknown vulnerabilities from Zero Day polymorphic and metamorphic worm exploits,” […]

2 total views, 2 today

 

J . R. Crandall, S. F. Wu, and F. T. Chong, “Experiences using Minos as a t...

J . R. Crandall, S. F. Wu, and F. T. Chong, “Experiences using Minos as a tool for capturing and analyzing novel worms for unknown […]

2 total views, 2 today