CHAPTER FIVE Security Architecture and Models

Terms you’ll need to understand:

image Buffer overflows

image Security modes

image Rings of protection

image Trusted Computer System Evaluation Criteria (TCSEC)

image Information Technology System Evaluation Criteria (ITSEC)

System ...

Get CISSP Exam Cram, Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.