Shows how to control information and use file system permissions effectively, control weak spots in the UNIX boot path, audit to assess and assure the level of security, secure incoming modems along with the UUCP networks, and binary patch programs to increase security of typically weak applications. Annotation copyright Book News, Inc. Portland, Or.
"synopsis" may belong to another edition of this title.
US$ 6.29 shipping within U.S.A.
Destination, rates & speedsSeller: Bingo Used Books, Vancouver, WA, U.S.A.
Soft cover. Condition: Fair. Trade paperback in fair condition. Seller Inventory # 170810
Quantity: 1 available
Seller: Romtrade Corp., STERLING HEIGHTS, MI, U.S.A.
Condition: New. This is a Brand-new US Edition. This Item may be shipped from US or any other country as we have multiple locations worldwide. Seller Inventory # ABNR-136646
Quantity: 1 available
Seller: Books Puddle, New York, NY, U.S.A.
Condition: Used. pp. 386. Seller Inventory # 263156227
Quantity: 1 available
Seller: Majestic Books, Hounslow, United Kingdom
Condition: Used. pp. 386. Seller Inventory # 4691676
Quantity: 1 available
Seller: Biblios, Frankfurt am main, HESSE, Germany
Condition: Used. pp. 386. Seller Inventory # 183156233
Quantity: 1 available
Seller: Mispah books, Redhill, SURRE, United Kingdom
Paperback. Condition: Like New. Like New. book. Seller Inventory # ERICA79000700256066
Quantity: 1 available