Shows how to control information and use file system permissions effectively, control weak spots in the UNIX boot path, audit to assess and assure the level of security, secure incoming modems along with the UUCP networks, and binary patch programs to increase security of typically weak applications. Annotation copyright Book News, Inc. Portland, Or.