<--- Back to Details
First PageDocument Content
Linux kernel / Linux / Cross-platform software / Kernel / Git / Merge window / Andrew Morton / Mm tree / Linux Security Modules / Software / Computing / Computer architecture
Linux kernel
Linux
Cross-platform software
Kernel
Git
Merge window
Andrew Morton
Mm tree
Linux Security Modules
Software
Computing
Computer architecture

Add to Reading List

Source URL: www.linux-magazine.com

Download Document from Source Website

File Size: 86,77 KB

Share Document on Facebook

Similar Documents

Embedded Linux / Smartphones / Windows NT architecture / Cross-platform software / Android / Mandatory access control / Architecture of Windows NT / Kernel / Linux Security Modules / Computing / Software / Computer architecture

Poster: Full Support for Reference Monitoring in Android’s Application Framework Michael Backes Sven Bugiel

DocID: 1fvCs - View Document

Linux Security Modules: General Security Hooks for Linux Stephen Smalley NAI Labs

DocID: 1f7jD - View Document

Computer security / Android / Malware / Embedded Linux / Rootkit / Rooting / Ptrace / Privilege escalation / Linux Security Modules / Computing / Smartphones / Software

Yet Another Android Rootkit /protecting/system/is/not/enough/ Tsukasa OI – Research Engineer Fourteenforty Research Institute, Inc.

DocID: 1904I - View Document

System software / Cross-platform software / Linux kernel / Kernel / Application programming interfaces / Linux Security Modules / Software / Computing / Linux

Linux Plumbers Conference / LinuxCon EuropeHow to design a Linux kernel interface Michael Kerrisk man7.org Training and Consulting

DocID: 18P5N - View Document

Security-Enhanced Linux / Linux Security Modules / Type enforcement / Linux-VServer / Sandbox / Linux kernel / Operating system-level virtualization / Kernel / Operating system / System software / Software / National Security Agency

Pastures: Towards Usable Security Policy Engineering Sergey Bratus, Alex Ferguson, Doug McIlroy, Sean Smith Dartmouth College Abstract will later review several such approaches that enjoy de facto

DocID: 18NsH - View Document