Practical UNIX & Internet Security

Practical UNIX & Internet SecuritySearch this book
Previous: 6.7 Encryption and U.S. LawPart IIINext: 7. Backups

Part III: System Security

This part of the book is directed primarily towards the UNIX system administrator. It describes how to configure UNIX on your computer to minimize the chances of a break-in, as well as to limit the opportunities for a nonprivileged user to gain superuser access.

Previous: 6.7 Encryption and U.S. LawPractical UNIX & Internet SecurityNext: 7. Backups
6.7 Encryption and U.S. LawBook Index7. Backups