Rule Based Analysis of Computer Security
Computers are rarely as secure as they could be. Users are lax or inconsistent in the way they configure a computer's protection system, and these user mistakes often lead to serious security holes. For example, a privileged user might accidentally make his login initialization file publicly...
প্রধান লেখক: | |
---|---|
প্রকাশিত: |
2023
|
অনলাইন ব্যবহার করুন: | https://hdl.handle.net/1721.1/149665 |