Access Control Methodologies chapple02 10/12/04 7:59 AM Page 25 CHAPTER 2 Access Control MethodologiesAfter reading this chapter, you will be able to: