Security kernel

Results: 400



#Item
211Computer security / Access control / Identity management / Unix / Loadable kernel module / Kernel / STREAMS / Mandatory access control / FreeBSD / Computing / Computer architecture / System software

TrustedBSD Project Update 11 May 2006 Robert N. M. Watson Security Research Computer Laboratory University of Cambridge

Add to Reading List

Source URL: www.watson.org

Language: English - Date: 2006-05-13 15:50:57
212Internet protocols / Network architecture / Internet standards / Data security / Computer security / Honeypot / Transmission Control Protocol / Firewall / Ip / Computing / Internet / Computer network security

Know Your Enemy: Sebek A kernel based data capture tool The Honeynet Project http://www.honeynet.org Last Modified: 17 November 2003

Add to Reading List

Source URL: old.honeynet.org

Language: English - Date: 2003-11-17 14:46:22
213Computer security / Malware / Rootkit / Linux kernel / Keystroke logging / Loadable kernel module / Kernel / System software / Software / Cyberwarfare

Undermining the Linux Kernel:  Malicious Code Injec:on via /dev/mem  Anthony Lineberry  [removed]   Black Hat Europe 2009 

Add to Reading List

Source URL: blackhat.com

Language: English - Date: 2014-12-16 19:06:29
214Course / Reliability engineering / Computer security / Loadable kernel module / Systems engineering / Security / Education / Computer science

Information about the M.Sc. Computer Science programme for English-speaking students This information is intended for students with no German language skills. There are additional courses taught in German in addition to

Add to Reading List

Source URL: www.uni-passau.de

Language: English - Date: 2014-05-22 04:57:32
215Distributed computing architecture / Amoeba / Mach / Server / Unix / Kernel / Microkernel / Thread / Capability-based security / Computer architecture / System software / Operating systems

The Amoeba Distributed Operating System Andrew S. Tanenbaum & Gregory J. Sharp Vrije Universiteit De Boelelaan 1081a Amsterdam, The Netherlands Email: [removed], [removed]

Add to Reading List

Source URL: www.cs.vu.nl

Language: English - Date: 2000-06-20 03:27:57
216Unix / Linux / Linux kernel / File system / Operating system / Runlevel / GNU GRUB / Arch Linux / Security-Enhanced Linux / Software / System software / Computing

Introduction to Linux A Hands on Guide Machtelt Garrels Garrels.be

Add to Reading List

Source URL: tldp.org

Language: English - Date: 2008-06-06 09:26:05
217Application programming interfaces / Cross-platform software / Linux / Advanced Linux Sound Architecture / Linux Standard Base / C++ / X Window System / Linux kernel / Network Security Services / Software / Computing / System software

Linux Standard Base Trial Use Specification 4.0 Linux Standard Base Trial Use Specification 4.0 LSB Trial Use Specification  Copyright © 2008 Linux Foundation Permission is granted to copy, di

Add to Reading List

Source URL: refspecs.linuxfoundation.org

Language: English - Date: 2015-01-28 11:44:48
218Embedded Linux / Smartphones / Android / PostgreSQL / Middleware / X Window System / Linux kernel / Security-Enhanced Linux / Software / Free software / System software

Middleware MAC for Android Stephen Smalley Trusted Systems Research National Security Agency

Add to Reading List

Source URL: kernsec.org

Language: English - Date: 2012-09-09 07:46:45
219Android / National Security Agency / Security-Enhanced Linux / Embedded Linux / Smartphones / Mandatory access control / FLASK / Type enforcement / Linux kernel / Software / System software / Computer security

Security Enhanced (SE) Android: Bringing Flexible MAC to Android Stephen Smalley and Robert Craig Trusted Systems Research National Security Agency {sds,rpcraig}@tycho.nsa.gov

Add to Reading List

Source URL: www.internetsociety.org

Language: English - Date: 2013-04-23 16:59:42
220System software / Computer security / Wireless networking / Data security / Honeypot / Spamming / Pcap / Transmission Control Protocol / Packet analyzer / Software / Computing / Computer network security

Know Your Enemy: Sebek2 A kernel based data capture tool The Honeynet Project http://www.honeynet.org Last Modified: 13 September 2003

Add to Reading List

Source URL: www.infosecwriters.com

Language: English - Date: 2003-10-01 11:16:46
UPDATE