Uneingeschränkter Zugang

Securing Operating Systems (OS): A Comprehensive Approach to Security with Best Practices and Techniques


Zitieren

“About The Calyx Institute - Calyx Institute”. calyxinstitute.org. Retrieved 2 November 2021. About The Calyx Institute - Calyx Institute ”. calyxinstitute.org . Retrieved 2 November 2021. Search in Google Scholar

“Kali NetHunter Documentation”. Kali Linux Documentation. Retrieved 5 April 2020. Kali NetHunter Documentation ”. Kali Linux Documentation . Retrieved 5 April 2020. Search in Google Scholar

“Kali Linux 1.0 review”. LinuxBSDos.com. 14 March 2013. Retrieved 26 November 2019. Kali Linux 1.0 review ”. LinuxBSDos.com . 14 March 2013 . Retrieved 26 November 2019. Search in Google Scholar

Simionato, Lorenzo (24 April 2007). “Review: BackTrack 2 security live CD”. Linux.com. Retrieved 10 April 2019. Simionato Lorenzo ( 24 April 2007 ). “ Review: BackTrack 2 security live CD ”. Linux.com . Retrieved 10 April 2019. Search in Google Scholar

Barr, Joe (13 June 2008). “Test your environment’s security with BackTrack”. Linux.com. Retrieved 10 April 2019. Barr Joe ( 13 June 2008 ). “ Test your environment’s security with BackTrack ”. Linux.com . Retrieved 10 April 2019. Search in Google Scholar

“BackTrack 4 - Hacking galore”. Dedoimedo.com. 15 May 2009. Retrieved 10 April 2019. BackTrack 4 - Hacking galore ”. Dedoimedo.com . 15 May 2009 . Retrieved 10 April 2019. Search in Google Scholar

“BackTrack 5 R3 review”. LinuxBSDos.com. 17 August 2012. Retrieved 10 April 2019. BackTrack 5 R3 review ”. LinuxBSDos.com . 17 August 2012 . Retrieved 10 April 2019. Search in Google Scholar

“Parrot Security Could Be Your Next Security Tool”. Linux.com | the source for Linux information. 2 December 2016. Retrieved 9 March 2018. Parrot Security Could Be Your Next Security Tool ”. Linux.com | the source for Linux information . 2 December 2016 . Retrieved 9 March 2018. Search in Google Scholar

Vervloesem, Koen (27 April 2011). “The Amnesic Incognito Live System: A live CD for anonymity [LWN.net]”. lwn.net. Archived from the original on 21 August 2017. Retrieved 14 June 2017. Vervloesem Koen ( 27 April 2011 ). “ The Amnesic Incognito Live System: A live CD for anonymity [LWN.net] ”. lwn.net . Archived from the original on 21 August 2017. Retrieved 14 June 2017. Search in Google Scholar

“Devs cook up ‘leakproof’ all-Tor untrackable platform”. The Register. 13 November 2012. Retrieved 10 July 2014. Devs cook up ‘leakproof’ all-Tor untrackable platform ”. The Register . 13 November 2012 . Retrieved 10 July 2014. Search in Google Scholar

Greenburg, Andy (17 June 2014). “How to Anonymize Everything You Do Online”. Wired. Retrieved 10 July 2014. Greenburg Andy ( 17 June 2014 ). “ How to Anonymize Everything You Do Online ”. Wired . Retrieved 10 July 2014. Search in Google Scholar

“Whonix adds a layer of anonymity to your business tasks”. TechRepublic. 4 January 2013. Retrieved 10 July 2014. Whonix adds a layer of anonymity to your business tasks ”. TechRepublic . 4 January 2013 . Retrieved 10 July 2014. Search in Google Scholar

Pentoo (Gentoo) Based Linux Review, Features and Screenshot Tour, TecMint. Pentoo (Gentoo) Based Linux Review, Features and Screenshot Tour, TecMint . Search in Google Scholar

KITE Introduces a New Secured FOSS Based Operating System. KITE Introduces a New Secured FOSS Based Operating System . Search in Google Scholar

A Look at Pentoo Linux and Its Security Analysis Tools, eWeek. A Look at Pentoo Linux and Its Security Analysis Tools, eWeek . Search in Google Scholar

12 Best Operating Systems For Ethical Hacking And Penetration Testing | 2018 Edition 12 Best Operating Systems For Ethical Hacking And Penetration Testing | 2018 Edition Search in Google Scholar

“about | Alpine Linux”. alpinelinux.org. about | Alpine Linux ”. alpinelinux.org . Search in Google Scholar

says, GigaTux (24 August 2010). “Alpine Linux 2 review | LinuxBSDos.com”. says, GigaTux ( 24 August 2010 ). “ Alpine Linux 2 review | LinuxBSDos.com ”. Search in Google Scholar

“Fedora Silverblue User Guide: Fedora Docs”. docs.fedoraproject.org. Archived from the original on 11 October 2021. Retrieved 11 October 2021. Fedora Silverblue User Guide: Fedora Docs ”. docs.fedoraproject.org. Archived from the original on 11 October 2021 . Retrieved 11 October 2021. Search in Google Scholar

OpenBSD Project (19 May 2020). “OpenBSD”. OpenBSD.org. Retrieved 12 October 2020. OpenBSD Project ( 19 May 2020 ). “ OpenBSD ”. OpenBSD.org . Retrieved 12 October 2020. Search in Google Scholar

“Qubes OS bakes in virty system-level security”. The Register. 5 September 2012. Qubes OS bakes in virty system-level security ”. The Register . 5 September 2012 . Search in Google Scholar

Stallings (2005). Operating Systems, Internals and Design Principles. Pearson: Prentice Hall. p.6. Stallings ( 2005 ). Operating Systems, Internals and Design Principles . Pearson : Prentice Hall . p. 6 . Search in Google Scholar

“Desktop Operating System Market Share Worldwide”. StatCounter Global Stats. Archived from the original on 2 October 2023. Retrieved 3 October 2023. Desktop Operating System Market Share Worldwide ”. StatCounter Global Stats. Archived from the original on 2 October 2023 . Retrieved 3 October 2023. Search in Google Scholar

“Mobile & Tablet Operating System Market Share Worldwide”. StatCounter Global Stats. Retrieved 2 October 2023. Mobile & Tablet Operating System Market Share Worldwide ”. StatCounter Global Stats . Retrieved 2 October 2023. Search in Google Scholar

“Twenty Years of Linux according to Linus Torvalds”. ZDNet. April 13, 2011. Archived from the original on September 19, 2016. Retrieved September 19, 2016. Twenty Years of Linux according to Linus Torvalds ”. ZDNet . April 13 , 2011 . Archived from the original on September 19, 2016. Retrieved September 19, 2016. Search in Google Scholar

“What Is Linux: An Overview of the Linux Operating System”. Medium. 11 April 2020. Retrieved 16 July 2023. What Is Linux: An Overview of the Linux Operating System ”. Medium . 11 April 2020 . Retrieved 16 July 2023. Search in Google Scholar

eISSN:
2470-8038
Sprache:
Englisch
Zeitrahmen der Veröffentlichung:
4 Hefte pro Jahr
Fachgebiete der Zeitschrift:
Informatik, andere