Chapter 2 Controlling a Computer. Overview Fundamentals of computer hardware General strategies for access control Buffer overflow attacks on computers.