This document is a book about computer security for administrators and users of computer networks. It contains an introduction to computer security and operating systems. Some key points covered include definitions of hackers and operating systems, a brief history of operating systems, and an overview of security aspects of operating systems such as external security, internal security, processor security, memory security and file security. The document provides guidance on securing operating systems.