click to print


We can hide and store information, but how do we actually use it? This chapter talks about tools for remotely connecting to and/or managing information sources and services in a secure manner. Secure storage is great, but what happens when you need to access that data, or move it from one machine to another? How do you do this securely?

Key Points

  • The ability to access information from anywhere is one of the most powerful benefits of network computing, but the lack of universal standards for computing makes it hard to capitalize on the opportunity.
  • Different operating system and networking architectures support different approaches to accessing information. Visually focused operating systems such as Windows and MacOS emphasize usability over flexibility. More complex systems like Linux use a textual interface for efficiency.
  • It’s important to match the right method of accessing information to a particular task. Some tasks are best accomplished within a visual environment (creative design) while others benefit from the flexibility of a textual interface (servers). A mismatch can lead to security problems.


These chapters describe the major technologies for data access across networks: