Page 556 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 556

FIGURE 9.1 In the commonly used four-ring model, protection rings
               segregate the operating system into kernel, components, and drivers
   551   552   553   554   555   556   557   558   559   560   561