[1]
Chenxiangyang, Method. Linux Practices of Mexican(version 2)[M]. Beijing: The science press, (1998).
Google Scholar
[2]
Wang Hong, Hou Gang and so on, operating system Discipline (Linux) - - exercise explanation, sample question analysis, experimental instruction (the second edition). Beijing: Water conservancy and Hydroelectric Power Press, August, 2008. 214-284.
Google Scholar
[3]
Zhang Heng, Zhang Yusen, Lu Weidong, Implementation and Assessment on the Capability Mechanism of Linux Security Enhancement System, [J], Journal of System Simulation., 2004, 16 (1) : 79 - 81.
Google Scholar
[4]
Feng HongWei, Wang Peng. Operating system teaching and experimental design research. Laboratory research and exploration, in 2007, the 26th volume (12 issues): 251-253.
Google Scholar
[5]
WangHong. Research on the structure design of operating systems, [C]. AMMASS 2012, Guangzhou, China. P474-479.
Google Scholar
[6]
Yang Yanhang, Sun Bingxin. A Security Policy for Operating System, Journal of North-East Forestry[J]. , 01/25/(2003).
Google Scholar
[7]
Wang Hong, Hou Gang and so on, operating system Discipline (Linux) - - exercise explanation, sample question analysis, experimental instruction (the second edition). Beijing: Water conservancy and Hydroelectric Power Press, August, 2008. 214-284.
Google Scholar
[8]
Wang Yahui, Zhong Keding, Yuying. An Idea of Security Enhancement based on Linux Operating System, Computer Applications and Software [J], Computer Applications and Software. , . 04/12/(2005).
Google Scholar
[9]
Zhang Heng, Zhang Yusen, Lu Weidong, Implementation and Assessment on the Capability Mechanism of Linux Security Enhancement System, Journal of System Simulation [J], Journal of System Simulation., 2004, 16 (1) : 79 - 81.
Google Scholar
[10]
WangHong. Architecture-Centric Software Process for Pattern Based Software Reuse, [C]. WCSE 2009. P95-99.
Google Scholar