Summary

Now that you have learned the basics of Windows 2000 networking, it's time to dive into the discussion of several issues that are particularly interesting for system administrators, developers, and sometimes for the users who are going to deal with security in Windows 2000 networks. In this chapter, you have just touched the tip of the iceberg of the key technologies that the network security is based upon. Further chapters reveal the secrets of these technologies for you.

Get Microsoft® Windows® 2000 Security Handbook now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.