Linux Standard Base

Results: 169



#Item
11Freedom of Information Act – Publication Scheme A guide to the information routinely available from the Legal Services Board The Freedom of Information Act 2000 (‘the Act’) requires public authorities like the Lega

Freedom of Information Act – Publication Scheme A guide to the information routinely available from the Legal Services Board The Freedom of Information Act 2000 (‘the Act’) requires public authorities like the Lega

Add to Reading List

Source URL: www.legalservicesboard.org.uk

Language: English - Date: 2015-01-12 05:23:58
12GOVERNMENT COMPUTING  Standard deviation  36 LinuxUser & Developer/31

GOVERNMENT COMPUTING Standard deviation 36 LinuxUser & Developer/31

Add to Reading List

Source URL: www.jasonkitcat.com

Language: English - Date: 2006-11-04 17:56:11
13GHOST glibc gethostbyname() Vulnerability CVEJohannes B. Ullrich, Ph.D. SANS Technology Institute https://isc.sans.edu

GHOST glibc gethostbyname() Vulnerability CVEJohannes B. Ullrich, Ph.D. SANS Technology Institute https://isc.sans.edu

Add to Reading List

Source URL: isc.sans.org

Language: English - Date: 2015-01-28 10:13:58
14Committee: (PL22) - U.S. TAG to ISO/IEC JTC 1/SC22  National Designation Title

Committee: (PL22) - U.S. TAG to ISO/IEC JTC 1/SC22 National Designation Title

Add to Reading List

Source URL: www.incits.org

Language: English - Date: 2014-10-20 17:39:53
15Standards: An Overview Of the Single UNIX® Specification Version 3 Andrew Josey Director of Certification The Open Group

Standards: An Overview Of the Single UNIX® Specification Version 3 Andrew Josey Director of Certification The Open Group

Add to Reading List

Source URL: www.unix.org

Language: English - Date: 2003-08-25 01:39:48
16Standards: An Overview Of the Single UNIX® Specification Version 3 Andrew Josey Director of Certification The Open Group

Standards: An Overview Of the Single UNIX® Specification Version 3 Andrew Josey Director of Certification The Open Group

Add to Reading List

Source URL: www.opengroup.org

Language: English - Date: 2002-09-06 04:36:44
173 How to Identify Security Requirements on a Server 3.1 System Base 3.2 Services 3.3 Users, User IDs and Paths 3.4 Logging

3 How to Identify Security Requirements on a Server 3.1 System Base 3.2 Services 3.3 Users, User IDs and Paths 3.4 Logging

Add to Reading List

Source URL: www.rsbac.org

Language: English - Date: 2006-05-02 09:37:02
18GHOST glibc gethostbyname() Vulnerability CVE[removed]Johannes B. Ullrich, Ph.D. SANS Technology Institute https://isc.sans.edu

GHOST glibc gethostbyname() Vulnerability CVE[removed]Johannes B. Ullrich, Ph.D. SANS Technology Institute https://isc.sans.edu

Add to Reading List

Source URL: www.dshield.org

Language: English - Date: 2015-01-28 10:13:58
19Computer icon / World Wide Web / HTML / Linux Standard Base / Virtual method table / Document Object Model / Pointer / Computing / Hyperlink / Internet

Linux Standard Base C++ Specification for PPC32 2.1

Add to Reading List

Source URL: refspecs.linuxbase.org

Language: English - Date: 2015-01-28 11:44:48
20Proceedings of the Linux Symposium June 27th–30th, 2007 Ottawa, Ontario Canada

Proceedings of the Linux Symposium June 27th–30th, 2007 Ottawa, Ontario Canada

Add to Reading List

Source URL: www.linuxinsight.com

Language: English - Date: 2007-07-16 08:38:48