Chapter 21. Implementing Security
Using Templates to Implement Security Policies 727
Using Security Configuration and Analysis 734
Implementing Access Control 745
Using Internet Protocol Security Policies 752
In the realm of computer security, one of the most common and critical mistakes administrators make is to confuse the presence of security features with a secure system. It’s not enough to piece together protocols, methods, and algorithms into a collage of security. In such environments, the weakest link usually goes unnoticed until it’s too late. To be ...
Get Microsoft® Windows Server 2003: Administrator’s Companion now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.