Author of the publication

Practical UNIX and Internet security

, and . Computer security O'Reilly, Bonn u.a., 2. ed., expanded & updated, compl. rewritten and exp. to include Internet security edition, (1996)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Language translation for file paths., , and . Digit. Investig., 10 (Supplement): S78-S86 (2013)Picking up the trash: Exploiting generational GC for memory analysis., , and . Digit. Investig., (2017)Hash-based carving: Searching media for complete files and file fragments with sector hashing and hashdb., and . Digit. Investig., (2015)Bitfrost: the one laptop per child security model., and . SOUPS, volume 229 of ACM International Conference Proceeding Series, page 132-142. ACM, (2007)Programming Unicode.. login Usenix Mag., (2012)Building Cocoa applications - a step-by-step guide., and . O'Reilly, (2002)Digital forensics XML and the DFXML toolset.. Digital Investigation, 8 (3-4): 161-174 (2012)Johnny 2: a user test of key continuity management with S/MIME and Outlook Express., and . SOUPS, volume 93 of ACM International Conference Proceeding Series, page 13-24. ACM, (2005)Enabling Email Confidentiality through the use of Opportunistic Encryption.. DG.O, Digital Government Research Center, (2003)Views, Reactions and Impact of Digitally-Signed Mail in e-Commerce., , , , and . Financial Cryptography, volume 3570 of Lecture Notes in Computer Science, page 188-202. Springer, (2005)