Security And Privacy For Microsoft Office 2010 Users
Microsoft Press
A Division of Microsoft Corporation
One Microsoft Way
Redmond, Washington 98052-6399
Copyright © 2012 by Microsoft Corporation
All rights reserved. No part of the contents of this book may be reproduced or
transmitted in any form or by any means without the written permission of the
publisher.
Library of Congress Control Number: 2012932376
ISBN:978-0-7356-6883-6
Printed and bound in the United States of America.
First Printing
Microsoft Press books are available through booksellers and distributors worldwide.
If you need support related to this book, email Microsoft Press Book Support at
mspinput@microsoft.com. Please tell us what you think of this book at
http://www.microsoft.com/learning/booksurvey.
Microsoft and the trademarks listed athttp://www.microsoft.com/about/legal/en/us
/IntellectualProperty/Trademarks/EN-US.aspx are trademarks of the Microsoft group of
companies. All other marks are property of their respective owners.
The example companies, organizations, products, domain names, email addresses, logos,
people, places, and events depicted herein are fictitious. No association with any real
company, organization,product, domain name, email address, logo, person, place, or
event is intended or should be inferred.
This book expresses the author’s views and opinions. The information contained in
this book is provided without any express, statutory, or implied warranties. Neither the
authors, Microsoft Corporation, nor its resellers, or distributors will be held liable for any
damages caused or alleged tobe caused either directly or indirectly by this book.
Acquisitions Editor: Rosemary Caperton
Editorial Production: Diane Kohnen, S4Carlisle Publishing Services
Copyeditor: Susan McClung
Indexer: Maureen Johnson
C ontents at a Glance
Introduction
ix
Chapter 1
Why Should I Care?
1
Chapter 2
Alice Downloads a Document
9
Chapter 3
Bob Prepares a Policy
31Chapter 4
Carol Collaborates on Some Content
57
Appendix
73
Index
79
iii
CONTENTS
Introduction
Chapter 1
ix
Why Should I Care?
1
■
2
■
What’s My Role in This?
5
■
Chapter 2
Hey, It’s Not My Responsibility!
Summary
8
Alice Downloads a Document
9
Working with Protected View
10
■
Danger Ahead
Inside Protected View12
Configuring Protected View
16
Exiting Protected View
20
Other Triggers for Protected View
■
11
21
Understanding Trust
22
Trusted Documents
Trusted Locations
■
24
26
Summary
29
What do you think of this book? We want to hear from you!
Microsoft is interested in hearing your feedback so we can continually improve our
books and learning resourcesfor you. To participate in a brief online survey, please visit:
microsoft.com/learning/booksurvey
v
vi
Contents
Chapter 3
Bob Prepares a Policy
31
■
32
■
Working with Document Inspector
38
■
Working with Digital Signatures
43
■
What About Office 365?
54
■
Chapter 4
Understanding Document Properties
Summary
56
Carol Collaborateson Some Content
57
■
Encrypting a Document
58
■
Restricting Editing
62
■
Summary
71
Appendix
73
Index
79
What do you think of this book? We want to hear from you!
Microsoft is interested in hearing your feedback so we can continually improve our
books and learning resources for you. To participate in a brief online survey, please visit:microsoft.com/learning/booksurvey
Acknowledgments
I would especially like to thank the following individuals at Microsoft who
peer-reviewed this book to ensure technical accuracy:
Nam Ngo, SDET II for PARC (Publishing, Authoring, Reading, and
Collaborating)
Harold Kless, Senior Support Escalation Engineer for CSS (Customer
Support Services)
Eran Kolber, Regional Director and Platform Value...
Regístrate para leer el documento completo.