Loading...
Loading...
Shows how to control information and use file system permissions effectively, control weak spots in the UNIX boot path, audit to assess and assure the level of security, secure incoming modems along with the UUCP networks, and binary patch programs to increase security of typically weak applications. Annotation copyright Book News, Inc. Portland, Or.
Page Count:
386
Publication Date:
1993-01-01
Certification
Operating Systems
Unix
Programming Languages
Specialty Boutique
New, Used & Rental Textbooks
C & C++
CompTIA
Community Tags