![[ICO]](/icons/blank.gif) | Name | Last modified | Size | Description |
|
![[PARENTDIR]](/icons/back.gif) | Parent Directory | | - | |
![[ ]](/icons/layout.gif) | Secure Computer Applications in an Enterprise Environment (1998).pdf | 2019-03-07 18:38 | 1.3M | |
![[ ]](/icons/layout.gif) | The Development and Analysis of Intrusion Detection Algorithms (1998).pdf | 2019-03-07 18:39 | 1.2M | |
![[ ]](/icons/layout.gif) | Virus Bullettin - The International Publication on Computer Virus Prevention, Recognition and Removal (1998).pdf | 2019-03-07 18:38 | 276K | |
![[ ]](/icons/layout.gif) | Lecture Notes on Internet Security (1998).pdf | 2019-03-07 18:38 | 83K | |
![[ ]](/icons/layout.gif) | E-Mail Bombs and Countermeasures - Cyber Attacks on Availability and Brand Integrity (1998).pdf | 2019-03-07 18:38 | 76K | |
![[ ]](/icons/layout.gif) | Evaluating Intrusion Detection Systems without Attacking your Friends - The 1998 DARPA Intrusion Detection Evaluation (1998).pdf | 2019-03-07 18:39 | 70K | |
![[ ]](/icons/layout.gif) | Placing Backdoors through Firewalls (1998).pdf | 2019-03-07 18:39 | 22K | |
|