Seguran\c ca em Computa\c c\~ao

Raul H.C. Lopes


Our goal is not to provide a "how to" guide for potential penetrators of operating systems. Rather we study these flaws to understand the careful analysis necessary in designing and testing operating systems (Pfleeger and Pfleeger in "Security in Computing")

Outline

Refer\^encias b\'asicas

Links de interesse

Refer\^encias por T\'opico