J
Josiah Bruner.
OS Security

Requirements of HW

Virtualization & Security

Authentication

Authorization

SELinux


Covert Channels


Distributed Systems Security
Basics

Getting security

Secure Boot and Loading

Delegation

Together


Database Security