|
|||
1. Introduction to Solaris Trusted Extensions Software 2. Logging In to Trusted Extensions (Tasks) 3. Working in Trusted Extensions (Tasks) |
How This Guide Is OrganizedChapter 1, Introduction to Solaris Trusted Extensions Software describes the basic concepts that are implemented on a Solaris system that is configured with Trusted Extensions. Chapter 2, Logging In to Trusted Extensions (Tasks) presents procedures for accessing a system and for leaving a system that is configured with Trusted Extensions. Chapter 3, Working in Trusted Extensions (Tasks) describes how to use Trusted Extensions to perform your job. Chapter 4, Elements of Trusted Extensions (Reference) explains the key elements in a system that is configured with Trusted Extensions. Glossary describes security terms that are used in Trusted Extensions. |
||
|