* Imparts good security doctrine, methodology, and strategies * Each application-focused chapter will be able to be used as a stand-alone HOW-TO for that particular application. * Offers users a selection of resources ( websites, mailing lists, and books ) to further their knowledge.