Solaris Trusted Extensions Administrator's Procedures
Previous Next
Chapter 10

Security Requirements on a Trusted Extensions System (Overview)

This chapter describes configurable security features on a system that is configured with Solaris Trusted Extensions.

Previous Next