Solaris Trusted Extensions

Results: 6



#Item
1Intelligence / Espionage / Solaris Trusted Extensions / Raytheon / Computer security / Military intelligence / Security / DCGS-A / National security

CASE STUDY United States Army Analysis and Control Element (ACE) Block II, Distributed Common Ground System – Army (DCGS-A) Customer

Add to Reading List

Source URL: www.raytheoncyber.com

Language: English - Date: 2015-04-19 23:42:34
2Directory services / Solaris Trusted Extensions / Internet protocols / Sun Java System Directory Server / Extension / Solaris / Lightweight Directory Access Protocol / Oracle Database / Software / Computing / Proprietary software

Oracle® Solaris Trusted Extensions Configuration and Administration Part No: 821–1482–02 November 2011

Add to Reading List

Source URL: docs.oracle.com

Language: English - Date: 2012-02-22 10:24:59
3Sun Java System Directory Server / Solaris / Lightweight Directory Access Protocol / Oracle Database / Extension / Solaris Trusted Extensions / Software / Directory services / Computing

Trusted Extensions Configuration Guide Part No: 820–3508–15 April 2012 Copyright © 1994, 2012, Oracle and/or its affiliates. All rights reserved.

Add to Reading List

Source URL: docs.oracle.com

Language: English - Date: 2012-07-18 06:47:15
4Directory services / Internet standards / Lightweight Directory Access Protocol / Oracle Database / Solaris / Extension / Solaris Trusted Extensions / Software / Computing / Internet protocols

Trusted Extensions Configuration and Administration Part No: E29017–01 October 2012

Add to Reading List

Source URL: docs.oracle.com

Language: English - Date: 2012-12-03 16:55:29
5Computer network security / Solaris Trusted Extensions / Solaris / Kerberos / Sun Microsystems / Pluggable authentication module / SunOS / Security-focused operating system / Trusted operating system / Software / Computing / System software

There and Back Again – A Solaris Security Tale Glenn Brunette Distinguished Engineer Sun Microsystems, Inc.

Add to Reading List

Source URL: nvd.nist.gov

Language: English - Date: 2012-07-31 09:52:12
6Common Criteria / Protection Profile / Security Target / Mandatory access control / Evaluation Assurance Level / Solaris / Trusted Computer System Evaluation Criteria / Trusted computing base / Sun Microsystems / Computer security / Evaluation / Solaris Trusted Extensions

PDF Document

Add to Reading List

Source URL: www.oracle.com

Language: English
UPDATE