Copyright © 2015 Pearson Education, Inc. Chapter 5 Chapter 5.
Chapter 5. If attackers cannot get access to your resources, they cannot attack them This chapter presents a number of important access control tools,