Uneingeschränkter Zugang

Securing Operating Systems (OS): A Comprehensive Approach to Security with Best Practices and Techniques


Zitieren

Figure 1.

A Visualization of Standard security attacks
A Visualization of Standard security attacks

Figure 2.

An illustration of Program Threats (On the left with the layout for a typical stack frame, Hypothetical stack frame for (a) before then (b) after, on the right A boot-sector computer virus)
An illustration of Program Threats (On the left with the layout for a typical stack frame, Hypothetical stack frame for (a) before then (b) after, on the right A boot-sector computer virus)

Figure 3.

The Morris Internet worm an illustration
The Morris Internet worm an illustration

Figure 4.

Cryptography Security Tool in action (on the left A secure communication over an insecure medium, in the middle Encryption and decryption using RSA asymmetric cryptography, on the right A man-in-the-middle attack on asymmetric cryptography)
Cryptography Security Tool in action (on the left A secure communication over an insecure medium, in the middle Encryption and decryption using RSA asymmetric cryptography, on the right A man-in-the-middle attack on asymmetric cryptography)

Figure 5.

An illustration of Domain separation via firewall
An illustration of Domain separation via firewall

Figure 6.

An overall visualization of the findings
An overall visualization of the findings
eISSN:
2470-8038
Sprache:
Englisch
Zeitrahmen der Veröffentlichung:
4 Hefte pro Jahr
Fachgebiete der Zeitschrift:
Informatik, andere