Shows how to control information and use file system permissions effectively, control weak spots in the UNIX boot path, audit to assess and assure the level of security, secure incoming modems along with the UUCP networks, and binary patch programs to increase security of typically weak applications. Annotation copyright Book News, Inc. Portland, Or.
"synopsis" may belong to another edition of this title.
Seller: Bingo Used Books, Vancouver, WA, U.S.A.
Soft cover. Condition: Fair. Trade paperback in fair condition. Seller Inventory # 170810
Seller: Romtrade Corp., STERLING HEIGHTS, MI, U.S.A.
Condition: New. This is a Brand-new US Edition. This Item may be shipped from US or any other country as we have multiple locations worldwide. Seller Inventory # ABBB-110777
Seller: Majestic Books, Hounslow, United Kingdom
Condition: Used. pp. 386. Seller Inventory # 4691676
Quantity: 1 available
Seller: Books Puddle, New York, NY, U.S.A.
Condition: Used. pp. 386. Seller Inventory # 263156227
Seller: Biblios, Frankfurt am main, HESSE, Germany
Condition: Used. pp. 386. Seller Inventory # 183156233
Quantity: 1 available