Chapter 16
Using the System Security and
Analysis Tool (continued)
Figure 16-10
Checking system security