Chapter 8. Access Control for Information Systems
IN THIS CHAPTER, WE FOCUS ON THE SERVERS and networks that store sensitive information, and how to use the built-in access controls provided by various operating systems to control access to files and data. In the case studies at the end of the chapter, you'll read about how access controls are built into server and network infrastructures.
Get Access Control, Authentication, and Public Key Infrastructure now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.