Part III: Security


In this part:

Chapter 15: Logon and Authentication
Chapter 16: Authorization and Access Control
Chapter 17: Encrypting File System
Chapter 18: Implementing TCP/IP Security
Chapter 19: Securing Mobile Computers

Managing users access to the network and the resources on it are vital to protecting your organization s sensitive information. This part discusses strategies for authenticating users and controlling their access to network resources, as well as strategies for securing computers and files on your network.




Microsoft Windows XP Professional Resource Kit 2003
Microsoft Windows XP Professional Resource Kit 2003
ISBN: N/A
EAN: N/A
Year: 2005
Pages: 338
BUY ON AMAZON

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net