Summary

In this chapter, you’ve learned about the many different and potentially confusing kinds of document protection and security available in Word. You should now have a good idea about which forms of protection and security are useful and which ones give only a false sense of security. You’ve also learned about tracking changes and commenting on Word documents. You should now be able to do the following:

  • Use Information Rights Management to set strong protection for Word documents

  • Use Word’s legacy password protection, while understanding that it’s feeble protection at best

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset