<STRONG>*</STRONG>Imparts good security doctrine, methodology, and strategies <P><STRONG>*</STRONG>Each application-focused chapter will be able to be used as a stand-alone HOW-TO for that particular application. <P></P><P><STRONG>*</STRONG>Offers users a selection of resources (<EM><STRONG>websites, mailing lists, and books</STRONG></EM>) to further their knowledge. <P></P>