... install, leaving the system insecure. It is up to the system administrator (or user) to disable these utilities. However, to disable them, the administrator (or user) must first know of their existence. ... access to data. Nevertheless, the number of potential perpetrators is limited and access is usually restricted to a few, well-known protocols. Now, take that same database and connect it to the ... serve such system administrators well as an introduction to Internet security. Likewise, more experienced system administrators can effectively use this book to learn or perhaps refresh their...