Skip to Content
Information Security: Principles and Practices, Second Edition
book

Information Security: Principles and Practices, Second Edition

by Mark S. Merkow, Jim Breithaupt
June 2014
Intermediate to advanced
368 pages
9h 44m
English
Pearson IT Certification
Content preview from Information Security: Principles and Practices, Second Edition

Chapter 5. Security Architecture and Design

Chapter Objectives

After reading this chapter and completing the exercises, you will be able to do the following:

Image Summarize the concept of a trusted computing base (TCB)

Image Illustrate the concept of rings of trust

Image Distinguish among the protection mechanisms used in a TCB

Image Defend the purposes of security assurance ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Network Defense and Countermeasures: Principles and Practices, Second Edition

Network Defense and Countermeasures: Principles and Practices, Second Edition

William Easttom II

Publisher Resources

ISBN: 9780133589412Purchase book