Abstract
In this chapter, you will learn how to account for authorized users and reduce (or prevent) unauthorized use of your UNIX system.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Further Reading
Kochan, Stephen G. and Patrick H. Wood, UNIX System Security, Hasbrouck Heights, NJ: Hay den Book Company, 1985
Rieken, Bill and Webb, Jim, Adventures in UNIX System Administration, Santa Clara, CA: .sh consulting inc., 1988
Rights and permissions
Copyright information
© 1990 Springer-Verlag New York Inc.
About this chapter
Cite this chapter
Topham, D.W. (1990). System Security. In: A System V Guide to UNIX and XENIX. Springer, New York, NY. https://doi.org/10.1007/978-1-4612-3246-9_35
Download citation
DOI: https://doi.org/10.1007/978-1-4612-3246-9_35
Publisher Name: Springer, New York, NY
Print ISBN: 978-0-387-97021-9
Online ISBN: 978-1-4612-3246-9
eBook Packages: Springer Book Archive