Open Access. Powered by Scholars. Published by Universities.®

Databases and Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

Systems Architecture

Open source

Articles 1 - 3 of 3

Full-Text Articles in Databases and Information Systems

Linux 101: Ci-Trainseminar, Edward Aractingi Sep 2012

Linux 101: Ci-Trainseminar, Edward Aractingi

Edward Aractingi

An overview of how the Linux operating system.


Effective Security By Obscurity, John Christian Smith Dec 2011

Effective Security By Obscurity, John Christian Smith

John Christian Smith

"Security by obscurity" is a bromide which is frequently applied to undermine the perceived value of a certain class of techniques in security. This usage initially stemmed from applications and experience in the areas of cryptographic theory, and the open vs. closed source debate. Through the perceived absence of true security, the field of security by obscurity has not coalesced into a viable or recognizable approach for security practitioners. Consequently, this has resulted in these techniques going under-used and under-appreciated by defenders, while they continue to provide value to attackers, which creates an unfortunate information asymmetry. Exploring effective methods for …


Linux 101: Ci-Trainseminar, Edward Aractingi Jan 2011

Linux 101: Ci-Trainseminar, Edward Aractingi

IT Research

An overview of how the Linux operating system.