Approaching security from the perspective of Windows NT
operating systems, this guide addresses key issues such as protective features
available within NT, as well as potential security holes. It includes an
overview on how to craft defensive strategies and examines different security
protocols.