Security kernel

Results: 400



#Item
241Formal methods / Formal specification / Java virtual machine / Kernel / Programming language / Specification / Computer security / Domain / Abstraction / Computing / Software / Cross-platform software

An Avenue for High Confidence Applications in the 21st Century Timothy W. Kremann William B. Martin Frank Seaton Taylor ftimk, bradm, [removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00
242Unix / Cross-platform software / Filesystem Hierarchy Standard / System administration / Linux kernel / Uname / Security-Enhanced Linux / E820 / Procfs / Software / Computing / System software

4.3 Where Data is Stored Weight •3 Description

Add to Reading List

Source URL: creativecommonsng.org

Language: English - Date: 2014-10-14 13:59:11
243Supercomputers / Computer memory / Direct memory access / Motherboard / Myrinet / Trusted computing base / Kernel / Ring / Device driver / Computing / Computer hardware / Computer networks

Security of High-Performance Messaging Layers on Programmable Network Interface Architectures Srigurunath Chakravarthi [removed] Department of Computer Science Mississippi State University

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00
244Access control / Trusted Computer System Evaluation Criteria / Operating system / Loadable kernel module / Bell–LaPadula model / Kernel / File system / Discretionary access control / Biba Model / Computer security / National Security Agency / Mandatory access control

Policy-Enhanced Linux Paul C. Clark Naval Postgraduate School 833 Dyer Rd., Code CS Monterey, CA[removed]E-mail: [removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2000-11-03 00:00:00
245FIPS 140-2 / Software / Cryptographic Module Validation Program / Brocade Communications Systems / Safenet / Firmware / Security kernel / Linux kernel / FIPS 140-3 / Cryptography standards / Computing / Computer security

http://csrc.nist.gov/groups/STM/cmvp/documents[removed]140val-all.htm Certificate Number Validation / Posting Date

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-09-20 14:25:46
246Cyberwarfare / Hacking / Vulnerability / Patch / Linux kernel / Rainbow Series / Computer security / Software / Software testing

National Cyber Security Centre NCSC Security Advisory – NCSC-ADV[removed]September[removed]Patches available for critical vulnerability affecting Linux, UNIX and Mac OS X

Add to Reading List

Source URL: ncsc.govt.nz

Language: English - Date: 2014-09-25 20:21:24
247Cyberwarfare / Hacking / Vulnerability / Patch / Linux kernel / Rainbow Series / Computer security / Software / Software testing

National Cyber Security Centre NCSC Security Advisory – NCSC-ADV[removed]September[removed]Patches available for critical vulnerability affecting Linux, UNIX and Mac OS X

Add to Reading List

Source URL: www.ncsc.govt.nz

Language: English - Date: 2014-09-25 20:21:24
248Pcap / Tcpdump / Wireshark / Network Driver Interface Specification / Firewall / Packet capture / Architecture of Windows NT / Transmission Control Protocol / Kernel / Software / Computer network security / Berkeley Packet Filter

An Architecture for High Performance Network Analysis Fulvio Risso and Loris Degioanni Dipartimento di Automatica e Informatica – Politecnico di Torino Corso Duca degli Abruzzi, 24 – 10129 Torino, Italy {risso,degio

Add to Reading List

Source URL: www.winpcap.org

Language: English - Date: 2010-09-05 10:10:56
249Computer errors / Linux / Linux kernel / Kernel / Reboot / Red Hat Enterprise Linux / Computer security / Debian / Software / Computer architecture / Computing

kpatch Have your security and eat it too! Josh Poimboeuf Senior Software Engineer, Red Hat LinuxCon North America

Add to Reading List

Source URL: events.linuxfoundation.org

Language: English - Date: 2014-08-22 11:29:52
250Software testing / Patch / Software maintenance / Symantec / Vulnerability / Firefox / Kernel Patch Protection / Software / Computer security / Computing

SOLUTION BRIEF: THIRD-PARTY PATCH MANAGEMENT ........................................ Closing the Vulnerability Gap of ThirdParty Patching Who should read this paper

Add to Reading List

Source URL: www.symantec.com

Language: English - Date: 2013-07-29 18:18:09
UPDATE