This part of the book provides a basic introduction to computer
security, the Unix operating system, and security policy. The
chapters in this part are designed to be accessible to both users and
Chapter 1, takes a very basic look at several
basic questions: What is computer security? What is an operating
system? What is a deployment environment? It also introduces basic
terms we use throughout the book.
Chapter 2, explores the history of the Unix
operating system, and discusses the way that Unix history has
affected Unix security.
Chapter 3, examines the role of setting good
policies to guide protection of your systems. It also describes the
trade-offs you will need to make to account for cost, risk, and