This part of the book contains a number of useful lists and
Appendix A, contains a point-by-point list of many
of the suggestions made in the text of the book.
Appendix B, is a technical discussion of how the
Unix system manages processes. It also describes some of the special
attributes of processes, including the UID, GID, and SUID.
Appendix C, lists books, articles, and magazines
about computer security.
Appendix D, is a brief listing of some significant
security tools to use with Unix, including desrciptions of where to
find them on the Internet.
Appendix E, contains the names, telephone numbers,
and addresses of organizations that are devoted to ensuring that
computers become more secure.