This book provides an overview of Trusted UNIX, a new type of security-enhanced UNIX, and explains how both end users and IS managers can work together to make
When Practical Unix Security was first published more than a decade ago, it became an instant classic. Crammed with information about host security, it saved ma
This text focuses on the security fixes and tools used to fend off hackers. Topics include: passwords; permissions; cryptography; backups; and auditing and logg
Linux consistently turns up high in the list of popular Internet servers, whether it's for the Web, anonymous FTP, or general services like DNS and routing mail
Authoritative Answers to All Your Linux Security Questions—Specifically for Linux Administrators This is the most complete, most advanced guide to Linux secur