... Enterprises—and Beyond 1487.4 Additional Information 149Index 151xiv ContentsxvForeword Security it comes in many forms in the IT world: physical security around a data center, user IDauthentication ... 643.3.2 Assigning Security Levels and Categories 653.3.3 Security Labels (SECLABELs) 663.4 Securing UNIX System Services (USS) Files 683.5 zSecure 703.6 Additional Information 71Chapter ... database, audit records for anomaly detection. All these forms can be bought and paid for, yet, one element must betaught. That is, the human, the person who administers the security system, the...