This book is geared at postgraduate courses on managing and designing information systems. It concentrates primarily on security in military systems and looks at the different goals organisations might have in employing security techniques and which techniques are best suited...