October 2012
Intermediate to advanced
1104 pages
64h 7m
English
Possibly the most important and difficult step you can take is to limit access to shared files, folders, and printers. You can use the guidelines shown in Table 33.2 to help organize a security review of every machine on your network.
Table 33.2. Restricting Access Controls
Read now
Unlock full access