1
by Steger, Jim
Published 2008
Microsoft Press
Table of Contents: ... -- 3. Managing Security and Information Access -- pt. II. Customization -- 4. Entity Customization...

2
by Snyder, Mike
Published 2011
Microsoft Press
... and configuring security settings, using built-in workflow tools, deploying static or browser-processed files...