Security kernel

Results: 400



#Item
291Trusted computing base / Mandatory access control / Trusted Computing / Microkernel / Ring / Kernel / Operating system / Trustworthy computing / Security kernel / Computer security / Security / Computing

/tardir/tiffs/a408429.tiff

Add to Reading List

Source URL: edocs.nps.edu

Language: English - Date: 2004-07-15 15:52:20
292Computer security / Linux / Linux kernel / Loadable kernel module / Kernel / Ring / Security kernel / Principle of least privilege / Computer architecture / Computing / Software

DNS and Multilevel Secure Networks

Add to Reading List

Source URL: edocs.nps.edu

Language: English - Date: 2008-06-12 12:08:58
293Energy / World food price crisis / Food vs. fuel / Biodiesel / Agriculture / Food security / Palm kernel oil / Maize / Issues relating to biofuels / Biofuels / Sustainability / Environment

Ecofys[removed]Biofuels and food security

Add to Reading List

Source URL: www.epure.org

Language: English - Date: 2013-09-07 11:53:20
294Unix / Linux / Linux kernel / File system / Operating system / Runlevel / GNU GRUB / Arch Linux / Security-Enhanced Linux / Software / System software / Computing

PDF Document

Add to Reading List

Source URL: tldp.askapache.com

Language: English - Date: 2008-06-06 09:26:05
295Kernel-based Virtual Machine / Ntpd / Security-Enhanced Linux / Server / SYS / Configure script / File system / Hyper-V / System software / Software / Windows Server

PDF Document

Add to Reading List

Source URL: cloudstack.apache.org

Language: English - Date: 2013-09-27 10:00:05
296Kernel-based Virtual Machine / Ntpd / Security-Enhanced Linux / Server / File system / Configure script / SYS / Hyper-V / System software / Software / Windows Server

PDF Document

Add to Reading List

Source URL: cloudstack.apache.org

Language: English - Date: 2013-09-27 10:00:05
297Memory management / X86 architecture / Computer errors / Linux kernel / Linux / Local Descriptor Table / Kernel / C dynamic memory allocation / Loadable kernel module / Computer architecture / Computing / System software

Linux Kernel do_brk() Vulnerablility Copyright © 2003 iSEC Security Research THIS DOCUMENT AND ALL OF THE INFORMATION IT CONTAINS ARE PROVIDED "AS IS", FOR EDUCATIONAL PURPOSES ONLY, WITHOUT WARRANTY OF ANY KIND, WETHE

Add to Reading List

Source URL: isec.pl

Language: English - Date: 2013-04-06 18:26:03
298Red Hat / Linux / Red Hat Enterprise Linux / Linux kernel / Security-Enhanced Linux / Software / Computer architecture / System software

Microsoft Word - NAWIPS_6.5.0_Release_Notes.docx

Add to Reading List

Source URL: www.nco.ncep.noaa.gov

Language: English - Date: 2012-01-07 16:27:18
299Nmap / Red Hat Enterprise Linux / BUFR / Security-Enhanced Linux / Linux kernel / Software / System software / Cross-platform software

Microsoft Word - NAWIPS_6.7.0_Release_Notes.docx

Add to Reading List

Source URL: www.nco.ncep.noaa.gov

Language: English - Date: 2012-06-26 06:56:10
300Red Hat / Red Hat Enterprise Linux / Security-Enhanced Linux / Debian / Linux kernel / Software / Linux / Computer architecture

Microsoft Word - NAWIPS_6.6.0_Release_Notes.docx

Add to Reading List

Source URL: www.nco.ncep.noaa.gov

Language: English - Date: 2012-03-30 21:27:23
UPDATE