June 2014
Intermediate to advanced
368 pages
9h 44m
English
Chapter Objectives
After reading this chapter and completing the exercises, you will be able to do the following:
Summarize the concept of a trusted computing base (TCB)
Illustrate the concept of rings of trust
Distinguish among the protection mechanisms used in a TCB
Defend the purposes of security assurance ...