Security in Centralized Systems
What is security?
Storing protection data.
UNIX File Protection.
Authentication methods.
Users, Groups, and the superuser.
Previous slide
Next slide
Back to first slide
View graphic version