security in computing
DESCRIPTION
related to computer securityTRANSCRIPT
-
5/19/2018 security in computing
1/19Figure 3-1 Places Where a Buffer Can Overflow.
-
5/19/2018 security in computing
2/19
Figure 3-2 Data Structure for File Access.
-
5/19/2018 security in computing
3/19
Figure 3-3 Modified Data.
-
5/19/2018 security in computing
4/19
Figure 3-4 Virus Appended to a Program.
-
5/19/2018 security in computing
5/19
Figure 3-5 Virus Surrounding a Program.
-
5/19/2018 security in computing
6/19
Figure 3-6 Virus Integrated into a Program.
-
5/19/2018 security in computing
7/19
Figure 3-7 Virus Completely Replacing a Program.
-
5/19/2018 security in computing
8/19
Figure 3-8 Boot Sector Virus Relocating Code.
-
5/19/2018 security in computing
9/19
Figure 3-9 Recognizable Patterns in Viruses.
-
5/19/2018 security in computing
10/19
Figure 3-10 Stubs and Drivers.
-
5/19/2018 security in computing
11/19
Figure 3-11 Covert Channel Leaking Information.
-
5/19/2018 security in computing
12/19
Figure 3-12 Covert Channels.
-
5/19/2018 security in computing
13/19
Figure 3-13 File Lock Covert Channel.
-
5/19/2018 security in computing
14/19
Figure 3-14 File Existence Channel Used to Signal 100.
-
5/19/2018 security in computing
15/19
Figure 3-15 Covert Timing Channel.
-
5/19/2018 security in computing
16/19
Figure 3-16 Modularity.
-
5/19/2018 security in computing
17/19
Figure 3-17 Coupling.
-
5/19/2018 security in computing
18/19
Figure 3-18 Information Hiding.
-
5/19/2018 security in computing
19/19
Figure 3-19 Fault Discovery RateReported at Hewlett-Packard.