

Securing Resources
Securing Resources
This section contains the following topics:
Common Resources to Protect
About Resources
Resource Descriptor Table
Assigning Ownership
Resource Access Control
VM Protection Examples
Using an Updated Security Record
Copyright © 2014 CA Technologies.
All rights reserved.
 
|
|