This book shows users how the security mechanisms in UNIX can be linked together in a practical, cohesive security plan.
-- Discusses how to set up a security plan from an administrator's point of view, as well as how end users can protect their own files and workstations
-- Contains sample policies for different types of organizations, from casual use systems to highly secure systems
-- Disk contains Secure All, a replacement for the popular program COPS