Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Cover Page Copyright Page Contents at a Glance CONTENTS Acknowledgments Introduction
Who This Book Is For
Assumptions
How This Book Is Organized How to Get Support and Provide Feedback
Errata and Book Support We Want to Hear from You Stay in Touch
CHAPTER 1 Why Should I Care?
Hey, It’s Not My Responsibility! What’s My Role in This? Summary
CHAPTER 2 Alice Downloads a Document
Working with Protected View
Danger Ahead Inside Protected View Configuring Protected View Exiting Protected View Other Triggers for Protected View
Understanding Trust
Trusted Documents Trusted Locations
Summary
CHAPTER 3 Bob Prepares a Policy
Understanding Document Properties Working with Document Inspector Working with Digital Signatures What About Office 365? Summary
CHAPTER 4 Carol Collaborates on Some Content
Encrypting a Document Restricting Editing Summary
APPENDIX Learn More
General Resources on Office 2010 Security and Privacy Protected View Trusted Documents Trusted Locations Document Properties Document Inspector Digital Signatures Encrypt with Password Restrict Editing Resources on Office Web Apps and Office 365
Index About the Author
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion