TY - GEN N2 - Your computers are at risk, whether they are connected to a corporate intranet or the Internet, have access to a sensitive database, or simply sit on your desk when you're not there. In the Windows NT Security Guide, Steve Sutton, a security expert and corporate trainer, shows you how to maximize Windows NT's various security protections and avoid many of its pitfalls. This book explains NT's security features from a step-by-step, how-to perspective with numerous realistic examples. Whether you are a day-to-day user or network administrator, you'll find Windows NT Security Guide an invaluable reference. This book is accompanied by a complete set of on-line exercises and many "pencil" questions (and answers) so that you can also use it as a self-paced training tool. AB - Your computers are at risk, whether they are connected to a corporate intranet or the Internet, have access to a sensitive database, or simply sit on your desk when you're not there. In the Windows NT Security Guide, Steve Sutton, a security expert and corporate trainer, shows you how to maximize Windows NT's various security protections and avoid many of its pitfalls. This book explains NT's security features from a step-by-step, how-to perspective with numerous realistic examples. Whether you are a day-to-day user or network administrator, you'll find Windows NT Security Guide an invaluable reference. This book is accompanied by a complete set of on-line exercises and many "pencil" questions (and answers) so that you can also use it as a self-paced training tool. T1 - Windows NT security guide / AU - Sutton, Stephen A., AU - Sutton, Stephen A. CN - QA76.76.O63 ID - 12260 KW - Operating systems (Computers) KW - Computer security. KW - Windows. KW - Internet KW - WINDOWS NT : SECURITY FEATURES KW - INFORMATION SCIENCE (DOCUMENTATION) : DATA COMMUNICATIONS : WINDOWS SN - 0201419696 TI - Windows NT security guide / ER -