This book about information mechanisms to specify user and process rights, system vulnerabilities, safeguards and recovery plans and procedures, means to disguise information to ensure its integrity, confidentiality, authenticity and nonrepudiation, ways to protect againts infection, abuse or negative impacts to the proper operation of an information processing systems or network.