Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

I like this photograph because it illustrates how the easiest way to break system security is often to circumvent it rather than defeat it (as is the case with most software vulnerabilities related to insecure coding practices).

References

Wiki Markup
\[Saltzer 74\] Saltzer, J. H. "Protection and the Control of Information Sharing in Multics." _Communications of the ACM 17_, 7 (July 1974): 388-402.

...