Solaris Trusted Extensions Installation and Configuration
Previous Next

Who Should Use This Book

This book is for knowledgeable system administrators and security administrators who are installing Trusted Extensions software. The level of trust that is required by your site security policy, and your level of expertise, determines who can perform the configuration tasks.

Previous Next