computersecurityhandbook.com
Home  >  Fourth Edition  >  Chapter 17
Chapter 17 –  Operating System Security
     William Stallings, Ph.D.

Chapter Contents:

   17.1    Information Protection and Security
   17.2    Requirements for Operating System Security
   17.2.1    Requirements
   17.2.2    Computer System Assets
   17.2.2.1    Hardware
   17.2.2.2    Software
   17.2.2.3    Data
   17.2.3    Design Principles
   17.3    Protection Mechanisms
   17.3.1.    Protection of Memory
   17.3.2    User-Oriented Access Control
   17.3.3    Data-Oriented Access Control
   17.3.4    Protection Based on an Operating System Mode
   17.4    File Sharing
   17.4.1    Access Rights
   17.4.2    Simultaneous Access
   17.5    Trusted Systems
   17.5.1    Trojan Horse Defense
   17.6    Windows 2000 Security
   17.6.1    Access Control Scheme
   17.6.2    Access Token
   17.6.3    Security Descriptors
   17.7    Notes
   17.8    Further Reading
   17.9    References

Please report problems to the webmaster at: webmaster@removethis.rlgsc.com
copyright 2002-2006, Robert Gezelter, All Rights Reserved