Skip to Content
Elementary Information Security, 3rd Edition
book

Elementary Information Security, 3rd Edition

by Richard E. Smith
October 2019
Beginner content levelBeginner
708 pages
26h
English
Jones & Bartlett Learning
Content preview from Elementary Information Security, 3rd Edition
Chapter Opener Photo

© Digital_Art/Shutterstock

CHAPTER 2Controlling a Computer

About This Chapter

This chapter introduces fundamental mechanisms for controlling a computer’s operation, and it further develops the process of solving security problems. The chapter focuses on the following topics:

  • ■   Overview of the general strategies for controlling access

  • ■   Buffer overflow: a well-known technique for subverting computer software

  • ■   Introduction to attack scenarios and case studies

  • ■   Mechanisms typically used to control access within a computer

  • ■   Security planning: describing the protections needed and how to implement them

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Computer and Information Security Handbook, 3rd Edition

Computer and Information Security Handbook, 3rd Edition

John R. Vacca

Publisher Resources

ISBN: 9781284153057