⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 00000012.htm

📁 一份很好的linux入门资料
💻 HTM
📖 第 1 页 / 共 2 页
字号:
Protocols&nbsp;and&nbsp;Applications&nbsp;--&nbsp;quite&nbsp;good&nbsp;<BR>Uday&nbsp;O.&nbsp;Pabrai&nbsp;Vijay&nbsp;K.&nbsp;Gurbani&nbsp;<BR>McGraw-Hill&nbsp;Sept.96;&nbsp;$39,95US;&nbsp;0-07-048215-2&nbsp;357&nbsp;pages;&nbsp;paperback&nbsp;&nbsp;<BR><A HREF="http://www.amazon.com/exec/obidos/ISBN%3D0070482152/smartbookscomA/7262-8705911-407497">http://www.amazon.com/exec/obidos/ISBN%3D0070482152/smartbookscomA/7262-8705911-407497</A>&nbsp;<BR>&nbsp;<BR>DCE&nbsp;Security&nbsp;Programming&nbsp;--&nbsp;great&nbsp;<BR>Wei&nbsp;Hu&nbsp;<BR>O'Reilly&nbsp;&amp;&nbsp;Associates&nbsp;<BR>Jul.95;&nbsp;$29.95US;&nbsp;1-56592-134-8&nbsp;386&nbsp;pages&nbsp;&nbsp;<BR><A HREF="http://www.amazon.com/exec/obidos/ISBN%3D1565921348/smartbookscomA/7262-8705911-407497">http://www.amazon.com/exec/obidos/ISBN%3D1565921348/smartbookscomA/7262-8705911-407497</A>&nbsp;<BR>&nbsp;<BR>Securing&nbsp;Client/Server&nbsp;Computer&nbsp;Networks&nbsp;<BR>Peter&nbsp;T.&nbsp;Davis,&nbsp;pub&nbsp;McGraw&nbsp;Hill&nbsp;(1996),ISBN&nbsp;0-07-015841-X&nbsp;&nbsp;<BR><A HREF="http://www.itbs.co.uk/compsec2.htm#b8">http://www.itbs.co.uk/compsec2.htm#b8</A>&nbsp;<BR>&nbsp;<BR>UNIX&nbsp;Network&nbsp;Programming&nbsp;W.&nbsp;Richard&nbsp;Stevens&nbsp;-&nbsp;Prentice&nbsp;Hall&nbsp;-&nbsp;0139498761&nbsp;&nbsp;<BR>&nbsp;<BR>Practical&nbsp;UNIX&nbsp;Programming&nbsp;-&nbsp;A&nbsp;Guide&nbsp;to&nbsp;Concurrency,&nbsp;Communication&nbsp;and&nbsp;<BR>Multithreading&nbsp;-&nbsp;Kay.&nbsp;A.&nbsp;Robbins&nbsp;&amp;&nbsp;Steven&nbsp;Robbins&nbsp;-&nbsp;Prentice&nbsp;Hall&nbsp;-&nbsp;<BR>0134437063&nbsp;<BR>&nbsp;<BR>UNIX&nbsp;System&nbsp;V&nbsp;Network&nbsp;Programming&nbsp;-&nbsp;Stephen&nbsp;A.&nbsp;Rago&nbsp;-&nbsp;Addison&nbsp;Wesley&nbsp;-&nbsp;<BR>0201563185&nbsp;&nbsp;<BR>&nbsp;<BR>Internetworking&nbsp;with&nbsp;TCP/IP&nbsp;Vol.&nbsp;2&nbsp;:&nbsp;Design,&nbsp;Implementation&nbsp;and&nbsp;<BR>Internals&nbsp;(2/E)&nbsp;-&nbsp;<BR>Doublas&nbsp;E.&nbsp;Comer&nbsp;and&nbsp;David&nbsp;L.&nbsp;Stevens&nbsp;-&nbsp;Prentice&nbsp;Hall&nbsp;-&nbsp;0131255274&nbsp;<BR>&nbsp;<BR>The&nbsp;C&nbsp;FAQ&nbsp;<BR><A HREF="http://www.cs.ruu.nl/wais/html/na-dir/C-faq/faq.html">http://www.cs.ruu.nl/wais/html/na-dir/C-faq/faq.html</A>&nbsp;<BR>&nbsp;<BR>W3&nbsp;Resources&nbsp;on&nbsp;WWW&nbsp;Security:&nbsp;<BR><A HREF="http://www.w3.org/Security/">http://www.w3.org/Security/</A>&nbsp;<BR>&nbsp;<BR>Safe&nbsp;Internet&nbsp;Programming&nbsp;News&nbsp;<BR>(From&nbsp;the&nbsp;folks&nbsp;at&nbsp;Princeton&nbsp;that&nbsp;highlighted&nbsp;problems&nbsp;with&nbsp;Java)&nbsp;<BR><A HREF="http://www.cs.princeton.edu/sip/News.html">http://www.cs.princeton.edu/sip/News.html</A>&nbsp;<BR>&nbsp;<BR>The&nbsp;Security&nbsp;of&nbsp;Static&nbsp;Typing&nbsp;with&nbsp;Dynamic&nbsp;Linking&nbsp;.&nbsp;Drew&nbsp;Dean,&nbsp;<BR>Proceedings&nbsp;of&nbsp;the&nbsp;Fourth&nbsp;ACM&nbsp;Conference&nbsp;on&nbsp;Computer&nbsp;and&nbsp;Communications&nbsp;<BR>Security,&nbsp;April&nbsp;1997.&nbsp;<BR><A HREF="http://www.cs.princeton.edu/sip/pub/ccs4.html">http://www.cs.princeton.edu/sip/pub/ccs4.html</A>&nbsp;<BR>&nbsp;<BR>Provably-Secure&nbsp;Programming&nbsp;Languages&nbsp;for&nbsp;Remote&nbsp;Evaluation,&nbsp;Dennis&nbsp;<BR>Volpano,&nbsp;<BR>(in&nbsp;Electronic&nbsp;Computing&nbsp;Surveys&nbsp;and&nbsp;SIGPLAN&nbsp;Notices,&nbsp;1997.)&nbsp;<BR><A HREF="http://www.cs.nps.navy.mil/research/languages/papers/atsc/sdcr.ps">http://www.cs.nps.navy.mil/research/languages/papers/atsc/sdcr.ps</A>&nbsp;<BR>&nbsp;<BR>A&nbsp;Sound&nbsp;Type&nbsp;System&nbsp;for&nbsp;Secure&nbsp;Flow&nbsp;Analysis,&nbsp;Dennis&nbsp;Volpano,&nbsp;Geoffrey&nbsp;<BR>Smith&nbsp;and&nbsp;<BR>Cynthia&nbsp;Irvine.&nbsp;&nbsp;(Journal&nbsp;of&nbsp;Computer&nbsp;Security,&nbsp;Vol.&nbsp;4,&nbsp;No.&nbsp;3,&nbsp;1996,&nbsp;pp.&nbsp;<BR>1-21.)&nbsp;<BR><A HREF="http://www.cs.nps.navy.mil/research/languages/papers/atsc/jcs.ps.Z">http://www.cs.nps.navy.mil/research/languages/papers/atsc/jcs.ps.Z</A>&nbsp;<BR>&nbsp;<BR>On&nbsp;the&nbsp;Systematic&nbsp;Design&nbsp;of&nbsp;Web&nbsp;Languages,&nbsp;Dennis&nbsp;Volpano&nbsp;and&nbsp;Geoffrey&nbsp;<BR>Smith,&nbsp;<BR>(ACM&nbsp;Computing&nbsp;Surveys,&nbsp;Vol.&nbsp;28,&nbsp;No.&nbsp;2,&nbsp;June&nbsp;1996,&nbsp;pp.&nbsp;315-317)&nbsp;<BR><A HREF="http://www.cs.nps.navy.mil/research/languages/papers/atsc/surveys.ps.Z">http://www.cs.nps.navy.mil/research/languages/papers/atsc/surveys.ps.Z</A>&nbsp;<BR>&nbsp;<BR>J.&nbsp;Linn.&nbsp;Generic&nbsp;Security&nbsp;Service&nbsp;Application&nbsp;Program&nbsp;Interface.&nbsp;RFC&nbsp;<BR>1508.&nbsp;September&nbsp;<BR>1993.&nbsp;&nbsp;<BR><A HREF="ftp://archie.au/rfc/rfc1508.txt.gz">ftp://archie.au/rfc/rfc1508.txt.gz</A>&nbsp;<BR>&nbsp;<BR>M.&nbsp;Bishop,&nbsp;M.&nbsp;Dilger&nbsp;,&nbsp;&quot;Checking&nbsp;for&nbsp;Race&nbsp;Conditions&nbsp;in&nbsp;File&nbsp;Access&quot;.&nbsp;<BR>Computing&nbsp;<BR>Systems&nbsp;9(2)&nbsp;(Spring&nbsp;1996),&nbsp;pp.&nbsp;131-152.&nbsp;&nbsp;&nbsp;<BR><A HREF="http://seclab.cs.ucdavis.edu/papers/bd96.ps">http://seclab.cs.ucdavis.edu/papers/bd96.ps</A>&nbsp;<BR>&nbsp;<BR>C.C.W.&nbsp;Ko&nbsp;,&nbsp;&quot;Execution&nbsp;Monitoring&nbsp;of&nbsp;Security-Critical&nbsp;Programs&nbsp;in&nbsp;a&nbsp;<BR>Distributed&nbsp;System:&nbsp;A&nbsp;Specification-Based&nbsp;Approach&quot;,&nbsp;Ph.D.&nbsp;Thesis&nbsp;,&nbsp;<BR>August&nbsp;1996.&nbsp;<BR><A HREF="http://seclab.cs.ucdavis.edu/papers/ko96-phd-thesis.ps">http://seclab.cs.ucdavis.edu/papers/ko96-phd-thesis.ps</A>&nbsp;<BR>&nbsp;<BR>G.&nbsp;Fink,&nbsp;K.&nbsp;Levitt&nbsp;,&nbsp;&quot;Property-based&nbsp;Testing&nbsp;of&nbsp;Privileged&nbsp;Programs&quot;.&nbsp;<BR>Proc.&nbsp;of&nbsp;the&nbsp;10th&nbsp;<BR>Annual&nbsp;Computer&nbsp;Security&nbsp;Applications&nbsp;Conference&nbsp;Orlando,&nbsp;FL,&nbsp;5-9&nbsp;Dec.&nbsp;<BR>1994,&nbsp;pp.&nbsp;<BR>154-163.&nbsp;<BR><A HREF="http://seclab.cs.ucdavis.edu/papers/fl94.ps">http://seclab.cs.ucdavis.edu/papers/fl94.ps</A>&nbsp;<BR>&nbsp;<BR>An&nbsp;Architectural&nbsp;Overview&nbsp;of&nbsp;UNIX&nbsp;<BR>Network&nbsp;Security&nbsp;<BR>February&nbsp;18,&nbsp;1993&nbsp;&nbsp;<BR>Robert&nbsp;B.&nbsp;Reinhardt&nbsp;<BR><A HREF="mailto:breinhar@access.digex.com">breinhar@access.digex.com</A>&nbsp;&nbsp;<BR>ARINC&nbsp;Research&nbsp;Corporation&nbsp;<BR>2551&nbsp;Riva&nbsp;Road&nbsp;<BR>Annapolis,&nbsp;MD&nbsp;21401&nbsp;&nbsp;<BR><A HREF="http://www.alw.nih.gov/Security/Docs/network-security.html">http://www.alw.nih.gov/Security/Docs/network-security.html</A>&nbsp;<BR>&nbsp;<BR>&nbsp;<BR>Those&nbsp;ought&nbsp;to&nbsp;help&nbsp;just&nbsp;a&nbsp;little.&nbsp;<BR>(This&nbsp;has&nbsp;been&nbsp;a&nbsp;public&nbsp;service&nbsp;by&nbsp;the&nbsp;folks&nbsp;at&nbsp;<A HREF="http://www.gnss.com)">http://www.gnss.com)</A>&nbsp;<BR>&nbsp;<BR>&nbsp;<BR>Apropos&nbsp;of&nbsp;Nothing&nbsp;wrote:&nbsp;<BR>><I>&nbsp;&nbsp;</I><BR>><I>&nbsp;I'm&nbsp;looking&nbsp;for&nbsp;manuals&nbsp;and/or&nbsp;books&nbsp;that&nbsp;programming&nbsp;guidlines...&nbsp;It&nbsp;</I><BR>><I>&nbsp;would&nbsp;have&nbsp;info&nbsp;such&nbsp;as:&nbsp;</I><BR>><I>&nbsp;&nbsp;</I><BR>><I>&nbsp;Calls&nbsp;that&nbsp;fork&nbsp;a&nbsp;shell,&nbsp;how&nbsp;to&nbsp;work&nbsp;around&nbsp;them&nbsp;</I><BR>><I>&nbsp;Calls&nbsp;that&nbsp;can&nbsp;overflow&nbsp;a&nbsp;buffer,&nbsp;alternative&nbsp;calls&nbsp;</I><BR>><I>&nbsp;Etc...&nbsp;</I><BR>><I>&nbsp;&nbsp;</I><BR>><I>&nbsp;Does&nbsp;anyone&nbsp;know&nbsp;of&nbsp;such&nbsp;a&nbsp;book?&nbsp;</I><BR>><I>&nbsp;&nbsp;</I><BR>><I>&nbsp;I'm&nbsp;also&nbsp;looking&nbsp;for&nbsp;similar&nbsp;info&nbsp;for&nbsp;perl&nbsp;and&nbsp;shell.&nbsp;</I><BR>><I>&nbsp;&nbsp;</I><BR>><I>&nbsp;Thanks&nbsp;in&nbsp;advance,&nbsp;</I><BR>><I>&nbsp;&nbsp;</I><BR>><I>&nbsp;gabe&nbsp;</I><BR><CENTER><H1>BBS水木清华站∶精华区</H1></CENTER></BODY></HTML>

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -