Читать книгу Information Security - Mark Stamp - Страница 26
Notes
Оглавление1 1 Not to be confused with “Alice's Restaurant” [52].
2 2 No, not that CIA.
3 3 This sentence is brought to you by the Department of Redundancy Department.
4 4 You did read that, right?
5 5 If someone asks you why a specific weak security measure is used when better options are available, the correct answer is usually “money,” or it might simply be due to an inability to overcome inertia.
6 6 Access control list, or ACL, is one of many overloaded terms that arise in the field of information security.
7 7 Consider, for example, the infamous buffer overflow attack. Historically, this one of the most serious security flaws of all time. What is the grand theory behind this particular exploit? There isn't any—it's essentially made possible by a quirk in the way that memory is laid out in modern processors.
8 8 Shadoobie [116].
9 9 Believe it or not.