Security kernel

Results: 400



#Item
371Malware / Computer security / Rootkits / Kernel / Hooking / Operating system / Ring / System call / Windows API / System software / Software / Computing

WHITE PAPER: SYMANTEC SECURITY RESPONSE Windows Rootkit

Add to Reading List

Source URL: www.symantec.com

Language: English - Date: 2006-03-26 10:01:13
372Linux / Red Hat Enterprise Linux / Up2date / Security-Enhanced Linux / Scientific Linux / Linux kernel / Debian / Software / Computer architecture / Red Hat

Scientific Linux The Experiment That Worked Troy Dawson

Add to Reading List

Source URL: www.scientificlinux.org

Language: English - Date: 2006-09-26 16:23:13
373Crime prevention / National security / Operating system / Mandatory access control / Password / Kernel / Access Control Matrix / Capability-based security / Ring / Security / Computer security / Access control

Microsoft Word - OS Security Considerations

Add to Reading List

Source URL: www.infosecwriters.com

Language: English - Date: 2005-07-05 08:26:00
374Computing / Multiple Independent Levels of Security / Software engineering / Kernel / Middleware / Objective Interface Systems / Common Object Request Broker Architecture / Operating system / Systems science / Systems engineering / CORBA / Partitioning Communication System

Microsoft PowerPoint - PCS_Tutorial_for_SBC_2004.ppt

Add to Reading List

Source URL: www.omg.org

Language: English - Date: 2009-05-28 13:23:05
375Cross-platform software / Linux kernel / SUSE Linux distributions / Ingo Molnár / MontaVista / Kernel / GNU / Debian / Linux Security Modules / Computer architecture / Software / Linux

Linux Kernel Development How Fast it is Going, Who is Doing It, What They are Doing, and Who is Sponsoring It

Add to Reading List

Source URL: www.linuxfoundation.org

Language: English - Date: 2008-04-03 16:40:53
376National Security Agency / Security-Enhanced Linux / Mandatory access control / Type enforcement / Fedora / Debian / Linux kernel / Access control / Antivirus software / Computer security / Software / System software

Yuichi Nakamura, Hitachi Software Engineering Co., Ltd. [removed]

Add to Reading List

Source URL: www.celinux.org

Language: English - Date: 2008-06-11 03:00:00
377Rootkits / Rkhunter / Extended Copy Protection / Chkrootkit / Antivirus software / Loadable kernel module / MediaMax CD-3 / Avira / Backdoor / System software / Software / Malware

Rootkits Stéphanie Deléamont and Benoît Perroud EPFL/LASEC: Security Protocols and Applications

Add to Reading List

Source URL: www.noisette.ch

Language: English - Date: 2006-04-29 07:02:38
378Evaluation / Integrity / Separation kernel / Kernel / Common Criteria / Green Hills Software / Linux kernel / Protection Profile / Operating system / Computer architecture / Software / System software

Green Hills Software INTEGRITY-178B Separation Kernel Security Target

Add to Reading List

Source URL: www.niap-ccevs.org

Language: English - Date: 2011-11-01 17:11:41
379Linux kernel / Linux Security Modules / Unix / Linux / Security-Enhanced Linux / Mandatory access control / Chris Wright / Type enforcement / Kernel / System software / Software / Computer architecture

Linux Security Module Framework Chris Wright and Crispin Cowan WireX Communications, Inc.

Add to Reading List

Source URL: www.kroah.com

Language: English - Date: 2002-09-05 02:32:05
380Computer security / Android / Embedded Linux / Smartphones / Mandatory access control / Grsecurity / Sandbox / Principle of least privilege / Linux kernel / System software / Software / Computing

The Case for SE Android Stephen Smalley

Add to Reading List

Source URL: selinuxproject.org

Language: English - Date: 2011-09-13 09:25:39
UPDATE