1.4 Summary
In this chapter, we looked briefly at the questions that underlie
computer security. What is computer security, and what are the
threats to it? What is an operating system? What is a deployment
environment? In the rest of the book, we'll explore all of these
questions and your role in trying to answer them.
|