Chapter Opener Photo

© Digital_Art/Shutterstock

CHAPTER 2
Controlling a Computer

About This Chapter

This chapter introduces fundamental mechanisms for controlling a computer’s operation, and it further develops the process of solving security problems. The chapter focuses on the following topics:

  • ■   Overview of the general strategies for controlling access

  • ■   Buffer overflow: a well-known technique for subverting computer software

  • ■   Introduction to attack scenarios and case studies

  • ■   Mechanisms typically used to control access within a computer

  • ■   Security planning: describing the protections needed and how to implement them

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset