Show simple item record

dc.contributor.authorBaldwin, Robert W.en_US
dc.date.accessioned2023-03-29T15:15:27Z
dc.date.available2023-03-29T15:15:27Z
dc.date.issued1988-03
dc.identifier.urihttps://hdl.handle.net/1721.1/149665
dc.description.abstractComputers are rarely as secure as they could be. Users are lax or inconsistent in the way they configure a computer's protection system, and these user mistakes often lead to serious security holes. For example, a privileged user might accidentally make his login initialization file publicly writable and that mistake could allow ordinary users to acquire super-user privileges.en_US
dc.relation.ispartofseriesMIT-LCS-TR-401
dc.titleRule Based Analysis of Computer Securityen_US
dc.identifier.oclc18430081


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record