Otwarty dostęp

Securing Operating Systems (OS): A Comprehensive Approach to Security with Best Practices and Techniques

  
28 mar 2024

Zacytuj
Pobierz okładkę

Figure 1.

A Visualization of Standard security attacks
A Visualization of Standard security attacks

Figure 2.

An illustration of Program Threats (On the left with the layout for a typical stack frame, Hypothetical stack frame for (a) before then (b) after, on the right A boot-sector computer virus)
An illustration of Program Threats (On the left with the layout for a typical stack frame, Hypothetical stack frame for (a) before then (b) after, on the right A boot-sector computer virus)

Figure 3.

The Morris Internet worm an illustration
The Morris Internet worm an illustration

Figure 4.

Cryptography Security Tool in action (on the left A secure communication over an insecure medium, in the middle Encryption and decryption using RSA asymmetric cryptography, on the right A man-in-the-middle attack on asymmetric cryptography)
Cryptography Security Tool in action (on the left A secure communication over an insecure medium, in the middle Encryption and decryption using RSA asymmetric cryptography, on the right A man-in-the-middle attack on asymmetric cryptography)

Figure 5.

An illustration of Domain separation via firewall
An illustration of Domain separation via firewall

Figure 6.

An overall visualization of the findings
An overall visualization of the findings
Język:
Angielski
Częstotliwość wydawania:
4 razy w roku
Dziedziny czasopisma:
Informatyka, Informatyka, inne