Discusses computer security, mapping a system's vulnerability, and efforts to safeguard the system and its contents.