Explains how to design and administer secure NT networks, protect data against system failures, configure auditing features, and securely access NT from remote locations
Charles B. Rutstein Book order

- 1997

Explains how to design and administer secure NT networks, protect data against system failures, configure auditing features, and securely access NT from remote locations