The four types of operations—read, modify, create, and destroy—that control access to NIS+ objects for each of the authorization rights categories.
A graphical user interface tool that you can use to manage local systems.
A system that caches all of its needed system software from a server.
An alternative name or names assigned to a program or to an electronic mail address.
A server set up and administered exclusively to provide application services to users over the network.
The process of identifying ...