Search Results
- Articles
- Books & Media
- Our Website
- Collection Guides
- Archival Materials
ArticlesSee all articles results »
From journals and magazines
-
Verifying information flow goals in Security-Enhanced Linux
http://duke.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwvV07T8MwELYKLCyUl0R5ZqjE5DZx4iSWqkooagTdoDynKHFsOvSBaCPgl_B38TlxoRKVmBhjWYlz9tl357vvQ6iZSRbmVEjshjzHnvQZztSpgjNBpRShm3kO1A4_hP0ncn0TxlENjUwtTCXBWQvSqtSI9GYN2g3RaFBxl7huux8NcImhqawT5c_Px0kZ6zaUGtACl9PFGO61OWRDfmBT27aGNoCWCVy1QRwt3DPH0cy5NiM-JiR4LCEef_ne8hH2bZf-SAXTp1NcR5_mv3RqdqtMTSmDFEs52wb88b9EsI22KoPXuihX6A6qickuqhsyCavaW_bQ1b3SBV10ZVVgrrBkLDmavlnPUzVQ1Wx1ht1BRbjXaQ-7WD33JkOdxGApr7p4h9Z9dBf3bqNLXPE8YO56_hyz0Hd4loLrR5hy8KRPeepJmxLpAx4YF35GNU4SsUVoczsIHCqghpcyxpXBd4AsR9oQzaUhCaTy-bwslbmXeTz1U89hOWkgbOYs4RX6OZBwjBLlBYFAEyVQ4OSkiRZoA50v-r-UuB8re56ZJZAo1YT7lnQipsUsIUyDrrIGasJUJmZiV7zo8G_djtCmnncdBjpG6_PXQpyUVBanekF_ARCpCv8
Journal Of Computer Security, Volume 13, Issue 1, pp. 115 - 134
Journal Article : Full Text Online
-
UML 2.0 BASED ROUND TRIP ENGINEERING FRAMEWORK FOR THE DEVELOPMENT OF SPF BASED SECURE (...)
http://duke.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV27TsQwELQQFRSIl8RbW9AaEsdJnDKXi3UHHAl56EQVxbFdohOCT-S_sJMg0lEArYtdaWR5Z6zdWYSuhY6Y9JXGHuskpjqIsDBVBQvla62YJ6hrZ4fX7O6ZPBWMJ5NVX7YnbLAHHoC77aQvXUEDIoPIWqEIL9CdQzpD_DsVip4aGVU-EVP9GxwabdEv5zT82cNWA36b8pOxevB9tDfSPoiHdAdoS70cot2JGeAR-qhXD0BuHJjFZTqHIqsf51AVyxwm5k_Ai3iVrrPiHox8g2qRwmSNJmQcypyPEco0qYsU4jz_GheG_09xjJY8rZIFtig0m8HLorHu0v2BwbwZMW9-wtw7QeBqx36f-oyE2ogsKlotqaBdG7TUjSQ5RbPfJzr7iyDnaMewHDY0hl2g7bfXd3U57H646m_NJ7cgwHs
Journal Of Engineering Science & Technology, Volume 13, Issue 9, pp. 2734 - 2749
Journal Article : Full Text Online
-
Networking in NSA security-enhanced Linux
http://duke.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV3NT8IwFG-Ek15UNMHvHZQLaWTrxraEYBbYQB0jyoh6Wja2BS4zYWL0v_d1XWEkGjRemu2laZpfX99rX98HQpdBrGuhEsWYaJMQy3FTxwFoFRxEShxHGglkkcYOP2l3L9LDo2Z18pqeNBYm82Wm9_M03yrfRDnQeFXq3_jJK0zdzPKHdWpfaojd8b3pwd3Xrb3Dyhb-YdH5DqxdEeu__AI04Bgaf_sHnlkOCgT4Bs6BFngH2l9xj8O8w_OAF2dk1NO80B2OkinzGoBr7OKjeLjNCPXi-Mybd87yGGQOuWtWBqVgZWCCEY4WmCis6AyXnLRjkUdy2wUThaSgU8lK2_AXdmfoWWPb9lzz2S2hkqpqZVQ17IHhjR0DFEnPMbtef2h3b53eqJD_PauovJzNugYl-bHA3UO7PD-3YDAM99FWlFTQLi-WIeSys4J2BssEuekBUlcAC7NEAICF1rTNMW5dT9sY_jnUQoYspR6immW6nT7m8_Fgn9LHFz-JXhepJ-ky4KOLpIoEMW5Q07OiSWoMF1Q58ONQDuSJ3_RlUQ-lI3SxYZTjjT1O0PZqHU9R-W2-iM5YxYvzn4H-AkRVMGI
Linux Journal, Volume 2005, Issue 129, p. 3
Magazine Article : Full Text Online
Books & MediaSee all books & media results »
Books, music, movies and more
-
Mastering security-enhanced Linux (SELinux).
https://find.library.duke.edu/catalog/DUKE99119271691108501
Video : View Online
-
Red Hat Enterprise Linux 5 administration unleashed
https://find.library.duke.edu/catalog/DUKE99119282773908501
Book : View Online
-
CentOS 7 Linux server cookbook : over 80 recipes to get up and running with CentOS 7 Linux server
https://find.library.duke.edu/catalog/DUKE99119327273108501
Book : View Online
Collection Guides
Detailed inventories of archival collections
Some materials and descriptions may include offensive content. More info