O'Reilly logo

Solaris 8 Security by Edgar Danielyan

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Summary

If your particular system or environment requires stricter control over authorized users’ actions, mandatory access control, or other additional security features provided by Trusted Solaris 8, you might want to consider using Trusted Solaris instead of standard Solaris. However, users and system administrators alike must be aware of the additional requirements imposed by Trusted Solaris 8 on both the hardware and the users. Although Trusted Solaris 8 is based on Solaris, it nevertheless has many concepts and features unknown in standard Solaris. Thus, users and system administrators need additional training to administer and use Trusted Solaris systems. Hardware requirements for a server that is to run Trusted Solaris 8 are also higher: ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required