Security kernel

Results: 400



#Item
321Security / Computer network security / Crime prevention / National security / Penetration test / Security testing / Metasploit Project / Vulnerability / Linux kernel / Computer security / Software testing / Cyberwarfare

Kali Linux – Assuring Security by Penetration Testing Lee Allen Tedi Heriyanto Shakeel Ali

Add to Reading List

Source URL: www.packtpub.com

Language: English
322Free software / Linux / Mm tree / Linux Security Modules / Software / Computer architecture / Linux kernel

The Kernel hacker generations Jan 2007 Andi Kleen, SUSE Labs, Novell [removed] Linux kernel as a long term project

Add to Reading List

Source URL: halobates.de

Language: English - Date: 2007-02-20 08:31:44
323Virtual machines / Computer network security / Hardware virtualization / Hyper-V / Xen / Hypervisor / Firewall / Kernel-based Virtual Machine / VM / System software / Software / Computer networking

vPF_RING: Towards Wire-Speed Network Monitoring Using Virtual Machines Alfredo Cardigliano 1 Luca Deri 1 2 1

Add to Reading List

Source URL: luca.ntop.org

Language: English - Date: 2011-12-05 05:04:13
324Central processing unit / Computer network security / Malware / Rootkit / LEON / CPU cache / Ring / Password / Kernel / Computer hardware / Computer security / Computing

Designing and implementing malicious hardware Samuel T. King, Joseph Tucek, Anthony Cozzie, Chris Grier, Weihang Jiang, and Yuanyuan Zhou University of Illinois at Urbana Champaign, Urbana, IL[removed]Abstract Hidden malic

Add to Reading List

Source URL: www.acoz.net

Language: English - Date: 2010-06-10 18:45:38
325Energy / World food price crisis / Food vs. fuel / Biodiesel / Agriculture / Food security / Palm kernel oil / Maize / Issues relating to biofuels / Biofuels / Sustainability / Environment

Ecofys[removed]Biofuels and food security

Add to Reading List

Source URL: www.ecofys.com

Language: English - Date: 2013-09-04 10:22:03
326Malware / Rootkit / System Management Mode / Virtual machines / Ring / Hypervisor / Cisco IOS / Kernel / Hyper-V / System software / Software / Computer security

Berlin Institute of Technology FG Security in Telecommunications © Weiss “Learning from Rootkits”

Add to Reading List

Source URL: stewin.org

Language: English - Date: 2012-03-27 11:15:55
327Trusted Computer System Evaluation Criteria / Common Criteria / Kernel / Evaluation Assurance Level / Ring / Shared resource / XTS-400 / Mandatory access control / Computer security / Evaluation / Multilevel security

High Assurance MLS File Service

Add to Reading List

Source URL: www.aesec.com

Language: English - Date: 2007-02-21 11:28:55
328Secure communication / Crime prevention / Electronic commerce / National security / Operating system / Ring / Server / Malware / Kernel / Computer security / Security / Computer network security

æ Sec Corporation The power of verifiable protectionTM Aesec was founded in 2001 to develop verifiably secure platforms. Our platforms can’t be subverted by malicious software. Enterprises and government need this fo

Add to Reading List

Source URL: www.aesec.com

Language: English - Date: 2007-02-21 11:28:47
329Free software / Linux / Mm tree / Linux Security Modules / Software / Computer architecture / Linux kernel

The Kernel hacker generations Jan 2007 Andi Kleen, SUSE Labs, Novell [removed] Linux kernel as a long term project

Add to Reading List

Source URL: www.halobates.de

Language: English - Date: 2007-02-20 08:31:44
330Microkernel / Virtual machines / Kernel / L4 microkernel family / Hypervisor / Mach / Ring / Operating system / Malware / Computer architecture / System software / Software

IQT QUARTERLY SOFTWARE INSECURITY By Rik Farrow While awareness of software security principles has improved tremendously over

Add to Reading List

Source URL: rikfarrow.com

Language: English - Date: 2010-11-19 16:21:21
UPDATE