This title looks at the pros and cons of open source security tools and demonstrates how to implement them. It also provides coverage of Bastille. The text includes detailed instructions, as well as... This description may be from another edition of this product.