Second Edition.
Intermediate Level Users.
If you are a Unix system administrator or user in this security conscious age, you need this book. It describes the issues and methods for implementing all kinds of Unix security methods, from passwords and file permissions to network monitoring, integrity checking, encryption, and physical security.