Chapter 2. Authentication: Proof of Identity
Chapter 3. AuthorizationLimiting System Access and Controlling User Behavior
Chapter 4. Restricting Access to Software; Restricting Software's Access to Resources
Chapter 5. Controlling Access to Data
Chapter 6. EFS Basics