Entry Laudicina:1999:E from sysadmin.bib
Last update: Wed Jul 13 02:04:01 2016
Top |
Symbols |
Math |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z
BibTeX entry
@Article{Laudicina:1999:E,
author = "Alan Laudicina",
title = "Exploits",
journal = j-SYS-ADMIN,
volume = "8",
number = "7",
pages = "55--59",
month = jul,
year = "1999",
CODEN = "SYADE7",
ISSN = "1061-2688",
bibdate = "Tue Jun 22 11:50:37 MDT 1999",
URL = "http://www.samag.com/",
abstract = "Laudicina explains how to protect your network from
common exploits and reviews some security analysis
tools.",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sysadmin.bib",
acknowledgement = ack-nhfb,
}
Related entries
- 6-6-8, 6-6-45, 6-11-8,
6(12)23,
7(4)27,
7(5)57,
7(7)41,
7(9)0-1,
7(9)z-z,
7(9)z-z,
7(10)57,
8(1)45,
8(1)55,
8(2)55,
8(3)47,
8(4)61,
8(6)57,
8(9)25,
8(9)35,
8(11)39,
9(2)33,
9(3)51,
9(5)79,
9(6)61,
9(8)55,
9(8)69,
9(9)33,
10(1)51,
10(3)57,
10(6)49,
10(7)z,
10(8)z,
10(8)z-1,
10(10)z,
10(11)35,
11(1)29
- 7-8-8,
7(9)z-z,
7(12)57,
8(1)39,
8(2)29,
8(2)43,
8(4)51,
8(4)61,
8(6)45,
8(9)43,
8(9)73,
8(10)43,
8(10)67,
8(11)29,
8(12)47,
9(5)29,
9(5)43,
9(6)45,
9(6)61,
9(10)73
- 8-1-8, 8-3-31, 8-7-8,
8(12)59,
9(1)41
- 8-4-20,
8(6)45,
8(6)51,
8(7)41,
8(9)35,
8(10)49,
8(11)29,
8(11)49,
8(12)77
- analysis,
7(5)21,
8(9)25,
9(9)33
- common,
8(9)6,
8(12)29,
9(1)37,
9(5)51
- protect,
6(12)37,
7(7)69,
7(9)63,
8(5)45,
8(7)49