Footnote
Chapter 1
1 P. Loscocco, S. Smalley, P. Muckelbauer, R. Taylor, S. Turner, J. Farrell. The Inevitability of Failure: The Flawed Assumption of Security in Modern Computing Environments. In Proceedings of the 21st National Information Systems Security Conference, pp. 303–314, October 1998, available at www.nsa.gov/selinux/papers/inevit-abs.cfm.
2 D. Baker. Fortresses Built Upon Sand. In Proceedings of the New Security Paradigms Workshop, pp. 148–153, 1996.
3 Anderson, James P. Computer Security Technology Planning Study, Volume II, ESD-TR-73-51, Vol. II, Electronic Systems Division, Air Force Systems Command, Hanscom Field, Bedford, MA 01730 (Oct. 1972), available at http://csrc.nist.gov/publications/history/ande72.pdf.
4 This is where ...
Get SELinux by Example: Using Security Enhanced Linux now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.