November 1999
Intermediate to advanced
880 pages
26h 6m
English
Workstation security encompasses the following subjects:
Protection from viruses, worms, and Trojan horses
Protection of local data from unauthorized access
To protect against malicious software, Notes includes the Execution Control List. To protect against unauthorized access to local data, Notes provides a whole series of tools, including features to protect the user ID and features to protect individual databases.
Under the first bullet point in the preceding list, you might include third-party antivirus software, about which there is plenty to say. But we're interested in Notes's built-in feature, the Execution Control List (ECL). The ECL is reminiscent of a database ACL in that it limits ...
Read now
Unlock full access