© fandijki/ShutterStock, Inc.

CHAPTER
8

Access Control for Information Systems

THIS CHAPTER FOCUSES ON THE SERVERS and networks that store sensitive information and how to use the built-in access controls provided by various operating systems to control access to files and data. In the case studies at the end of the chapter, you’ll read about how access controls are built into server and network infrastructures.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.226.251.22