(Only 4 years ago, the Lnux side of the book was still the wind. Some people thought the fledgling operating system had a bleak future, while others saw it as a hobby. As you can imagine, books on LiM security won't be a big deal. Today, in the server space, L5nM has grown faster than some commercial operating systems, such as wid-NT. With the sophistication of the KDE and GNoME environments, coupled with the support of highly innovative companies like EMel, L5Mux has now begun its expansion in the personal consumption field. No matter what you do with IJnux, you need to understand its security model. The advent of broadband service has suddenly turned every Internet-connected computer into a potential target for hackers. Without certain security precautions, you may face the risk of data loss, information theft, and even charges for being paralyzed. To make matters worse, IjnMx varies from version to version, and depending on the version, your Linux installation may be more secure than a traditional desktop OS, or more vulnerable than window5NT at its worst. This book follows the fine tradition of the previous edition, it provides the reader with the latest and most detailed information. Beginners will appreciate its extensive content, and experienced users will appreciate its unbiased approach to emerging technologies. No longer meaningful to just a few people, this book will continue to introduce you to the latest technologies and developments.)