CHAPTER 4
Sharing Files

Chapter Opener Photo

© Digital_Art/Shutterstock

About This Chapter

In this chapter, we work with the mechanisms provided by operating systems like Unix and Windows to protect files and folders. We also take a technical look at the fifth phase of the security process: monitoring the system. The chapter focuses on these topics:

  • ■   Tailoring the security policy to grant special access to individuals or groups

  • ■   Permission flags in Unix-like systems

  • ■   Access control lists in Macintosh and Windows systems

  • ■   Monitoring system events through logging

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset