Well, I would probably invest in a different book. Basically you have a couple things to remember.
There are rights that flow down from the top of the tree which are very limited. That prevents users from seeing objects in the tree they dont have rights to. Secondly you have the IRF which can "BLOCK" rights from a certain level down. The IRF works wonders when you are trying to prevent users from seeing below a certain level. Then there are effective rights where a user is assigned specific rights to specific objects. So you need to watch where those rights are and how they flow down. As complicated as it sounds, it does work a lot easier than Microsoft in that no user has rights until they are granted. That being said, if you were to map out the rights for a particular user, you should be able to figure out what rights they have and to what objects.
One rule though, never change the rights on the Public Trustee. Doing this grants or removes that particular right to everyone in the tree. I recall accidentally giving the browse object right to the PA and access to every object in the tree was granted. Though users could not open anything up, they were able to see what was in each and every folder on the network.
HTH
Mark C. Greenwood, CNE
m_jgreenwood@yahoo.com
With more than 10 years experience to share.