The heart of this somewhat dry book is a step-by-step guide to implementing a secure Unix network. The book defines each security issue and follows with instructions on what parameters to set, what... This description may be from another edition of this product.