Cherokee describes the security concept of triple A. She breaks down the relationship between authentication, authorization and accounting.
Right-click 'Download' and select 'Save Link As' if the file opens in a new tab.