The book describes the information security consequences if that is not compromised. It explores the file system design approaches or methodologies. It lightens the taxonomy of file system evaluation frameworks and elaborates the designs issues tracing file systems. The types of storage systems and storage encryption are discussed. The evaluation of the Java File Security System is documented.