October 2018
Beginner
784 pages
17h 34m
English
In general, after you get past the outer perimeter defenses, you can think of the inner perimeter as part of the three-level structure illustrated in Figure 8.1. Consider this perimeter as consisting of the operating system and its application programs that form the gateway to the data stored in the interior zone (folders and files).
FIGURE 8.1 The Inner Perimeter