Footnote

Chapter 1

1 P. Loscocco, S. Smalley, P. Muckelbauer, R. Taylor, S. Turner, J. Farrell. The Inevitability of Failure: The Flawed Assumption of Security in Modern Computing Environments. In Proceedings of the 21st National Information Systems Security Conference, pp. 303–314, October 1998, available at www.nsa.gov/selinux/papers/inevit-abs.cfm.

2 D. Baker. Fortresses Built Upon Sand. In Proceedings of the New Security Paradigms Workshop, pp. 148–153, 1996.

3 Anderson, James P. Computer Security Technology Planning Study, Volume II, ESD-TR-73-51, Vol. II, Electronic Systems Division, Air Force Systems Command, Hanscom Field, Bedford, MA 01730 (Oct. 1972), available at http://csrc.nist.gov/publications/history/ande72.pdf.

4 This is where ...

Get SELinux by Example: Using Security Enhanced Linux now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.