OUR FOUNDING HACKERS
ANDREA M. MATWYSHYN
INTRODUCTION
CHAPTER 1: ATTACKS ON CONFIDENTIALITY, INTEGRITY, AND AVAILABILITY
CHAPTER 2: LEAST PRIVILEGE
CHAPTER 3: ENCRYPTION
CHAPTER 4: SEGMENTATION
CHAPTER 5: STEGANOGRAPHY
CHAPTER 6: REDUNDANCY
CONCLUSION