Pub Date : 2019-04-16DOI: 10.1002/9781119553588.ch20
{"title":"Working with macOS and Linux","authors":"","doi":"10.1002/9781119553588.ch20","DOIUrl":"https://doi.org/10.1002/9781119553588.ch20","url":null,"abstract":"","PeriodicalId":180939,"journal":{"name":"CompTIA® A+® Complete Study Guide","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124911760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-04-16DOI: 10.1002/9781119553588.ch18
{"title":"Working with Windows 8/8.1","authors":"","doi":"10.1002/9781119553588.ch18","DOIUrl":"https://doi.org/10.1002/9781119553588.ch18","url":null,"abstract":"","PeriodicalId":180939,"journal":{"name":"CompTIA® A+® Complete Study Guide","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128563542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-13DOI: 10.1002/9781119553588.ch3
{"title":"Peripherals and Connectors","authors":"","doi":"10.1002/9781119553588.ch3","DOIUrl":"https://doi.org/10.1002/9781119553588.ch3","url":null,"abstract":"","PeriodicalId":180939,"journal":{"name":"CompTIA® A+® Complete Study Guide","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133345400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1993-04-20DOI: 10.1002/9781119553588.ch7
Jean-Luc Archimbaud
{"title":"Introduction to TCP/IP","authors":"Jean-Luc Archimbaud","doi":"10.1002/9781119553588.ch7","DOIUrl":"https://doi.org/10.1002/9781119553588.ch7","url":null,"abstract":"","PeriodicalId":180939,"journal":{"name":"CompTIA® A+® Complete Study Guide","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124768394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1002/9781119553588.ch23
Vijai Gandikota
The importance of Operating System Security has been well known for the last twenty five years. While there have been great strides in the development of mechanisms for application space security mechanisms the area of operating system security has largely been neglected. Today’s trends of distributed computing and the increased possibility for malicious attacks have shown the need to implement mandatory control mechanisms and policy flexibility. This paper discusses the need for greater operating system security and mandatory access mechanisms. It further discusses the Flask Architecture Implementation of these mechanisms and also the SELinux implementation which is based on the Flask Architecture.
{"title":"Securing Operating Systems","authors":"Vijai Gandikota","doi":"10.1002/9781119553588.ch23","DOIUrl":"https://doi.org/10.1002/9781119553588.ch23","url":null,"abstract":"The importance of Operating System Security has been well known for the last twenty five years. While there have been great strides in the development of mechanisms for application space security mechanisms the area of operating system security has largely been neglected. Today’s trends of distributed computing and the increased possibility for malicious attacks have shown the need to implement mandatory control mechanisms and policy flexibility. This paper discusses the need for greater operating system security and mandatory access mechanisms. It further discusses the Flask Architecture Implementation of these mechanisms and also the SELinux implementation which is based on the Flask Architecture.","PeriodicalId":180939,"journal":{"name":"CompTIA® A+® Complete Study Guide","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115166836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}