The following topics provide guidelines for environments where security is a concern: Logon Methods and Security Checksums