Chapter 11
Security Properties (continued)
Figure 11-13
Configuring security