Security-Enhanced Linux

Results: 107



#Item
61Cross-platform software / National Security Agency / Security-Enhanced Linux / Fedora Project / Linux / Type enforcement / Fedora / Linux kernel / Debian / Software / System software / Computing

Security-Enhanced Linux - User Guide

Add to Reading List

Source URL: docs.fedoraproject.org

Language: English - Date: 2014-12-09 11:06:10
62Personal computers / Mandatory access control / Linux / Access control / Macintosh / Computing / Software / Computer security

Policy-Enhanced Linux An Educational Tool Paul C. Clark [removed] Overview

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2000-11-03 00:00:00
63Cross-platform software / National Security Agency / Security-Enhanced Linux / Fedora Project / Computer network security / Unix / Fedora / Type enforcement / Linux kernel / Software / Computer architecture / System software

Security Guide - A Guide to Securing Fedora Linux

Add to Reading List

Source URL: docs.fedoraproject.org

Language: English - Date: 2013-12-13 19:06:36
64XTS-400 / Windows Server / Multilevel security / Multiple single-level / Mandatory access control / Client–server model / Security-Enhanced Linux / Trusted computing base / Server / Computer security / Computer network security / Evaluation

MYSEA: The Monterey Security Architecture Cynthia E. Irvine, Thuy D. Nguyen, David J. Shifflett, Timothy E. Levin, Jean Khosalim, Charles Prince, Paul C. Clark and Mark Gondree Department of Computer Science, Naval Postg

Add to Reading List

Source URL: www.cisr.us

Language: English - Date: 2010-03-24 14:46:06
65Unix / Cross-platform software / Filesystem Hierarchy Standard / System administration / Linux kernel / Uname / Security-Enhanced Linux / E820 / Procfs / Software / Computing / System software

4.3 Where Data is Stored Weight •3 Description

Add to Reading List

Source URL: creativecommonsng.org

Language: English - Date: 2014-10-14 13:59:11
66Access control / Trusted Computer System Evaluation Criteria / Operating system / Loadable kernel module / Bell–LaPadula model / Kernel / File system / Discretionary access control / Biba Model / Computer security / National Security Agency / Mandatory access control

Policy-Enhanced Linux Paul C. Clark Naval Postgraduate School 833 Dyer Rd., Code CS Monterey, CA[removed]E-mail: [removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2000-11-03 00:00:00
67Security-Enhanced Linux / Cgroups / Hypervisor / LXC / Hyper-V / Linux / Xen / System software / Software / National Security Agency

Use Cases for Docker in Enterprise Linux Environment CloudOpen North America, 2014 Linda Wang Sr. Software Engineering Manager

Add to Reading List

Source URL: events.linuxfoundation.org

Language: English - Date: 2014-08-22 14:43:33
68System software / Internet / Network Time Protocol / Security-Enhanced Linux / Simple Network Management Protocol / Cross-domain solution / Computing / Internet protocols / Internet standards

Guards at the Tactical Edge Secure Cross Domain Transfer for any Mission NanoXDTM

Add to Reading List

Source URL: www.gdc4s.com

Language: English - Date: 2014-12-03 04:04:50
69Red Hat / Red Hat Enterprise Linux / Linux distribution / Security-Enhanced Linux / Netrunner / CentOS / Slackware / Linux / Computer architecture / Software

The ninth project: create 115 page of awesome. Mission accomplished! SUBSCRIBE ON PAGE 60 18

Add to Reading List

Source URL: www.linuxvoice.com

Language: English - Date: 2014-08-06 06:01:59
70Linux / Red Hat Enterprise Linux / Evaluation / Security-Enhanced Linux / Mandatory access control / Linux kernel / Evaluation Assurance Level / Security-focused operating system / Red Hat cluster suite / Computer security / Software / Red Hat

Red Hat Enterprise Linux Security © 2009 specialized copyright information. If none, please delete this textbox. www.redhat.com

Add to Reading List

Source URL: www.redhat.com

Language: English - Date: 2009-10-06 10:21:41
UPDATE