<--- Back to Details
First PageDocument Content
Linux distributions / Red Hat / Linux kernel / Red Hat Enterprise Linux / Kernel / Linux
Date: 2015-10-11 18:23:50
Linux distributions
Red Hat
Linux kernel
Red Hat Enterprise Linux
Kernel
Linux

EXPLOITING THE LINUX KERNEL: MEASURES AND COUNTERMEASURES JON OBERHEIDE DUO SECURITY

Add to Reading List

Source URL: jon.oberheide.org

Download Document from Source Website

File Size: 1,23 MB

Share Document on Facebook

Similar Documents

Patterns for Writing As-Installed Tests for Debian Packages Antonio Terceiro, Debian Project Large software ecosystems, such as GNU/Linux distributions, demand a large amount of effort to make sure all of its components

DocID: 1txXN - View Document

Modelling and Resolving Software Dependencies Daniel Burrows <> June 15, 2005 Abstract Many Linux distributions and other modern operating systems feature the explicit declaration of (often complex) de

DocID: 1tmlO - View Document

SUSE Linux / Computer architecture / Software / Linux / SUSE Linux distributions / SUSE / High availability / Service Availability Forum / Novell Open Enterprise Server / Linux on z Systems / Linux Foundation

SUSE Linux Enterprise High Availability Roadmap ® Kai Dupke

DocID: 1rtnb - View Document

Pharmaceutical industry / Validity / Evaluation / Computer architecture / Software / Linux distributions / SUSE Linux / Quality / Validation / Verification and validation / OpenSUSE / SUSE Linux distributions

Automated Testing with openQA

DocID: 1rsux - View Document

Software / Computer architecture / System software / SUSE Linux / Red Hat software / Remote administration software / Linux distributions / Spacewalk / SUSE / Satellite / CentOS / Red Hat Enterprise Linux

Managing RH / CentOS with SUSE Manager ® Don Vosburg

DocID: 1rlvV - View Document