Unix security

Results: 312



#Item
301System administration / Unix / HP-UX / System V / Identity management / Password / Trusted Computer System Evaluation Criteria / Operating system / Access control / Computer security / Software / System software

HP-UX 11 Security Overview1 This document describes the security-related features and benefits of the HP-UX core operating system.

Add to Reading List

Source URL: www.nasi.com

Language: English - Date: 2011-01-13 18:21:32
302Linux kernel / Linux Security Modules / Unix / Linux / Security-Enhanced Linux / Mandatory access control / Chris Wright / Type enforcement / Kernel / System software / Software / Computer architecture

Linux Security Module Framework Chris Wright and Crispin Cowan WireX Communications, Inc.

Add to Reading List

Source URL: www.kroah.com

Language: English - Date: 2002-09-05 02:32:05
303Information theory / Privilege revocation / Evaluation / Mandatory Integrity Control / Ring / Operating system / Data integrity / Unix / Role-based access control / Computer security / Security / LOMAC

PDF Document

Add to Reading List

Source URL: alum.wpi.edu

Language: English - Date: 2004-08-23 17:54:47
304Software / Unix security / Filesystem permissions / File system / Rm / Computer file / Privilege / Password / Group identifier / Unix / Computing / System software

PDF Document

Add to Reading List

Source URL: www.tom-yam.or.jp

Language: English - Date: 2003-04-02 18:48:42
305Trusted computing base / Kernel / Separation kernel / Multilevel security / Operating system / Ring / Linux kernel / Unix / Security-Enhanced Linux / Computer architecture / Computer security / System software

PDF Document

Add to Reading List

Source URL: www.csl.sri.com

Language: English - Date: 2007-01-23 13:43:40
306Trusted computing base / Separation kernel / Kernel / Operating system / Multilevel security / Linux kernel / Ring / Unix / Server / Computer architecture / System software / Computer security

PDF Document

Add to Reading List

Source URL: www.csl.sri.com

Language: English - Date: 2004-05-25 18:32:46
307Unix / System administration / Cryptographic software / Privilege separation / OpenSSH / Privilege / Secure Shell / Principle of least privilege / Capability-based security / System software / Software / Computer security

PDF Document

Add to Reading List

Source URL: niels.xtdnet.nl

Language: English - Date: 2003-08-09 20:58:19
308Chroot / FreeBSD jail / Operating system-level virtualization / FreeBSD / Unix security / Procfs / Operating system / Securelevel / Kernel / System software / Software / Unix

PDF Document

Add to Reading List

Source URL: phk.freebsd.dk

Language: English - Date: 2004-01-01 14:02:41
309Computer security / Computer network security / Inetd / Filesystem Hierarchy Standard / Df / Rootkit / Env / Cd / Size / Computing / Software / Unix

PDF Document

Add to Reading List

Source URL: www.bandwidthco.com

Language: English - Date: 2012-02-12 19:09:52
310Unix / Access control / User identifier / Setuid / Filesystem permissions / Mandatory access control / Principle of least privilege / Discretionary access control / Multilevel security / Computer security / Security / Computing

PDF Document

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2004-03-30 13:44:01
UPDATE