Part II: Securing the Server Itself Chapter 2. Authentication: Proof of IdentityChapter 3. AuthorizationLimiting System Access and Controlling User BehaviorChapter 4. Restricting Access to Software; Restricting Software's Access to ResourcesChapter 5. Controlling Access to DataChapter 6. EFS Basics |