Security-Enhanced Linux

Results: 107



#Item
41Secure By Design: How Guardian Digital Secures EnGarde Secure Linux 1. Introduction to Guardian Digital and EnGarde Secure Linux 1.1. Pioneering Open Source Security in an Insecure World Since its inception in 1999, Guar

Secure By Design: How Guardian Digital Secures EnGarde Secure Linux 1. Introduction to Guardian Digital and EnGarde Secure Linux 1.1. Pioneering Open Source Security in an Insecure World Since its inception in 1999, Guar

Add to Reading List

Source URL: www.engardelinux.org

Language: English - Date: 2006-10-09 08:56:01
42Red Hat Enterprise Linux 6 Security Feature Overview Steve Grubb Principal Engineer, Red Hat June 23, 2010

Red Hat Enterprise Linux 6 Security Feature Overview Steve Grubb Principal Engineer, Red Hat June 23, 2010

Add to Reading List

Source URL: www.redhat.com

Language: English - Date: 2010-06-29 12:06:36
43SELinux Quick Start Guide  SELinux Quick Start Guide Revision History Revision $Revision: 1.1 $ $Date: [removed]:21:26 $ Revised by: pd

SELinux Quick Start Guide SELinux Quick Start Guide Revision History Revision $Revision: 1.1 $ $Date: [removed]:21:26 $ Revised by: pd

Add to Reading List

Source URL: www.engardelinux.org

Language: English - Date: 2006-01-03 14:54:00
44EnGarde Secure Linux[removed]Quick Start Guide  EnGarde Secure Linux[removed]Quick Start Guide Revision History Revision $Revision: 1.8 $ $Date: [removed]:20:17 $ Revised by: rwm

EnGarde Secure Linux[removed]Quick Start Guide EnGarde Secure Linux[removed]Quick Start Guide Revision History Revision $Revision: 1.8 $ $Date: [removed]:20:17 $ Revised by: rwm

Add to Reading List

Source URL: www.engardelinux.org

Language: English - Date: 2007-08-07 16:20:31
45Training Course on SUSE Certified Linux Administrator (CLA) Course Outline Day 1: 13 August[removed]Wed) SECTION 1: Manage Linux File System Day 1

Training Course on SUSE Certified Linux Administrator (CLA) Course Outline Day 1: 13 August[removed]Wed) SECTION 1: Manage Linux File System Day 1

Add to Reading List

Source URL: www.polyu.edu.hk

Language: English - Date: 2014-07-29 00:34:55
46The Case for Abstracting Security Policies    

The Case for Abstracting Security Policies   

Add to Reading List

Source URL: anil.recoil.org

Language: English
47    CYBER SECURITY OPERATIONS CENTRE    NOVEMBER 2013 

    CYBER SECURITY OPERATIONS CENTRE   NOVEMBER 2013 

Add to Reading List

Source URL: www.asd.gov.au

Language: English - Date: 2014-01-07 01:09:55
48Using GConf as an  Example of How to Create  an Userspace Object  Manager James Carter [removed]

Using GConf as an  Example of How to Create  an Userspace Object  Manager James Carter [removed]

Add to Reading List

Source URL: docs.huihoo.com

Language: English - Date: 2007-03-20 09:06:42
49Introduction to Linux  A Hands on Guide Machtelt Garrels Garrels.be

Introduction to Linux A Hands on Guide Machtelt Garrels Garrels.be

Add to Reading List

Source URL: mirrors.supportex.net

Language: English - Date: 2008-06-06 09:26:05
50Security Improvements Needed in Debian Russell Coker <russell@coker.com.au> Internet and Security Consulting Could one person at the front please monitor the conference IRC channel and forward comments/questions to me as

Security Improvements Needed in Debian Russell Coker Internet and Security Consulting Could one person at the front please monitor the conference IRC channel and forward comments/questions to me as

Add to Reading List

Source URL: mirror.linux.org.au

Language: English - Date: 2007-02-05 07:34:22