An end-to-end guide to safeguarding a company's information assets.KEY TOPICS: Identifies key issues in computer security, and the technologies that can help organizations respond. Presents guidance on developing a distributed systems architecture and methodology that is inherently more secure. Shows how to secure distributed transaction processing systems. Covers the human and organizational aspects of security. Discusses security issues that affect PCs, workstations and mainframes, with especially detailed coverage of UNIX security issues.MARKET: Anyone responsible for architecting, building, managing or auditing distributed computing applications, including software developers, project managers, system and network administrators, and security officers.