Explains how to design and administer secure NT networks, protect data against system failures, configure auditing features, and securely access NT from remote locations
Charles B. Rutstein Boeken


Explains how to design and administer secure NT networks, protect data against system failures, configure auditing features, and securely access NT from remote locations