Presents a Defense in Depth model for protecting various Windows networks. This book addresses the three elements of a successful security program: people, processes, and technology. It helps you... This description may be from another edition of this product.