Chapter 18. Active Directory Rights Management Services
In this chapter: |
---|
Most information technology professionals agree that protecting digital information is often a difficult and challenging task. Organizations spend increasing amounts to implement multiple layers of security, such as perimeter firewalls to protect access to the network and encryption and authentication technologies to help secure network communication. Documents are typically protected by using carefully designed security groups and access control lists (ACLs) that specify who can access information and the level of access allowed.
Even with all of these security methods implemented, organizations ...
Get Windows Server® 2008 Active Directory® Resource Kit now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.