Figure 10.10
Example Filter Conditions in Security Table