πŸ“‰
OMSCS Notes
search
⌘Ctrlk
πŸ“‰
OMSCS Notes
  • OMSCS Lecture Notes
  • information-security
  • machine-learning-trading
  • computer-networks
  • operating-systems
  • simulation
  • secure-computer-systems
    • Welcome to SCS
    • Getting Started
    • Design Principles for Secure Computer Systems
    • Protecting the TCB from Untrusted Applications
    • Virtualization and Security
    • Authentication
    • Discretionary Access Control
    • Mandatory Access Control
    • Midterm Exam Review
  • .github
gitbookPowered by GitBook
block-quoteOn this pagechevron-down

secure-computer-systems

Welcome to SCSchevron-rightGetting Startedchevron-rightDesign Principles for Secure Computer Systemschevron-rightProtecting the TCB from Untrusted Applicationschevron-rightVirtualization and Securitychevron-rightAuthenticationchevron-rightDiscretionary Access Controlchevron-rightMandatory Access Controlchevron-rightMidterm Exam Reviewchevron-right
PreviousInput Analysischevron-leftNextWelcome to SCSchevron-right

Last updated 4 years ago