August 2018
Intermediate to advanced
512 pages
17h 18m
English
• 9.2 Instruction Set Architectures
• 9.3 Supervisors with Rings and Things
• 9.4 Controlling Memory: Mapping, Capabilities, and Tagging
• Explain why hardware is the foundation of trustworthy systems.
• Compare how hardware security relates to the two types of processor instruction sets.
• Describe how supervisor mode and rings support a trustworthy system.
• Explain memory protection techniques and how they work with supervisor modes.