This book learn how to understand the CIA triad, the DAD triad and the evolution of the security industry, examine the pros and cons of various authentication systems, respond to the unique sucuruty issues of both windows and unix systems, identify appropriate security devices t protect againts various risks.