Chapter 20. Security and Delegation in Configuration Manager 2007

In the early days of computing and data communications, security concerns were often afterthoughts—that is, if any thought was given at all. Today, in a world where new threats emerge at an ever-increasing rate, the stakes are much higher as financial transactions, personal data, business records, intellectual property, military secrets, and vital infrastructure all require secure and reliable information systems. Every organization ...

Get System Center Configuration Manager 2007 Unleashed now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.