CHAPTER 17 Operating System Security Models
CHAPTER 18 Common Unix Vulnerabilities
CHAPTER 19 Linux Security
CHAPTER 20 Windows Security
CHAPTER 21 Novell Security