The Network Security Analysis of Linux Operating System

Article Preview

Abstract:

This article argues that in terms of security flaws Linux operating system. On this basis, it focuses on improving Linux security in two ways, one is the use and management of Linux from a security point of view, the second is upgrading the system, and improves their security thoroughly.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 998-999)

Pages:

1274-1277

Citation:

Online since:

July 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] J. M. Wang. Legal Based Lniux secure operating system. Southwest Jiaotong University, 2003, 61-64. (In Chinese).

Google Scholar

[2] D. ElliottBell. SeeuerComPuterSystems. MahtematiealFoundations , 2001. 6-8.

Google Scholar

[3] Z.W. WU. ALinux system administration, Posts and Telecom Press, 2002, 173-180. (In Chinese).

Google Scholar

[4] T Jiang and X.M. Li. Research on Information Security Model. Mini-Micro Systems, 2000, 1078 -1081. (In Chinese).

Google Scholar

[5] F. Weng. Teach you ten kinds Liunx improve system security tricks. NEW YORK, 2003, 11. (In Chinese).

Google Scholar