|
|||
1. Introduction to Solaris Trusted Extensions Software 2. Logging In to Trusted Extensions (Tasks) 3. Working in Trusted Extensions (Tasks) |
Who Should Use This BookThis book is for all users of Trusted Extensions. As a prerequisite, you must be familiar with the Solaris OS and one of the following desktops:
You must also be familiar with the security policy of your organization. |
||
|