Security-Enhanced Linux

Results: 107



#Item
1The Case for Abstracting Security Policies    

The Case for Abstracting Security Policies   

Add to Reading List

Source URL: rich.recoil.org

Language: English - Date: 2006-04-13 14:58:02
2Verification and Change-Impact Analysis of Access-Control Policies∗ Kathi Fisler Shriram Krishnamurthi

Verification and Change-Impact Analysis of Access-Control Policies∗ Kathi Fisler Shriram Krishnamurthi

Add to Reading List

Source URL: web.cs.wpi.edu

Language: English - Date: 2005-04-29 09:42:28
3SUSE_Powerpoint_Slide_Library_010616 copy

SUSE_Powerpoint_Slide_Library_010616 copy

Add to Reading List

Source URL: www.digitale-nachhaltigkeit.ch

Language: English - Date: 2016-06-27 01:17:47
4  LPIC-3: Linux Enterprise Professional Certification LPIC-3 303: Security

 LPIC-3: Linux Enterprise Professional Certification LPIC-3 303: Security

Add to Reading List

Source URL: www.futurecert.com

Language: English - Date: 2016-07-22 03:13:26
5Adding Ramparts to Your Bastille An Introduction to SELinux Hardening Def Con 24 Packet Capture Village Jay Beale

Adding Ramparts to Your Bastille An Introduction to SELinux Hardening Def Con 24 Packet Capture Village Jay Beale

Add to Reading List

Source URL: www.inguardians.com

Language: English - Date: 2016-08-05 14:35:56
6Valuable Tips & Tricks Managing SUSE With YaST and AutoYaST ®  Thomas Göttlicher

Valuable Tips & Tricks Managing SUSE With YaST and AutoYaST ® Thomas Göttlicher

Add to Reading List

Source URL: www.suse.com

Language: English - Date: 2016-07-27 11:33:33
7Live Updating Operating Systems Using Virtualization ∗ Haibo Chen,Rong Chen,Fengzhe Zhang,Binyu Zang Parallel Processing Institute, Fudan University {hbchen,chenrong,fzzhang,byzang}@fudan.edu.cn

Live Updating Operating Systems Using Virtualization ∗ Haibo Chen,Rong Chen,Fengzhe Zhang,Binyu Zang Parallel Processing Institute, Fudan University {hbchen,chenrong,fzzhang,byzang}@fudan.edu.cn

Add to Reading List

Source URL: ipads.se.sjtu.edu.cn

Language: English - Date: 2012-01-05 23:25:04
8Reference Policy for Security Enhanced Linux March 1, 2006 Christopher J. PeBenito,

Reference Policy for Security Enhanced Linux March 1, 2006 Christopher J. PeBenito,

Add to Reading List

Source URL: www.tresys.com

Language: English - Date: 2014-07-23 16:59:18
    9TxBox: Building Secure, Efficient Sandboxes with System Transactions Suman Jana The University of Texas at Austin   Donald E. Porter

    TxBox: Building Secure, Efficient Sandboxes with System Transactions Suman Jana The University of Texas at Austin Donald E. Porter

    Add to Reading List

    Source URL: www3.cs.stonybrook.edu

    Language: English - Date: 2011-03-07 14:32:49
    10

    PDF Document

    Add to Reading List

    Source URL: www.suse.com

    Language: English