Preventing an application from accessing hardware directly is also a form of data hiding.
- Chapter 1 Security Governance Through Principles and Policies
- from CISSP (ISC)2 Certified Information Systems Security Professional Official Study Guide, 7th Edition
- Publisher: Sybex
- Released: September 2015
Use as example of data hiding.
Share this highlighthttp://www.safaribooksonline.com/a/cissp-isc2-certified/11077386/