Securing Systems and Attached Devices in Oracle® Solaris 11.2

Exit Print View

Updated: September 2014
 
 

Using This Documentation

Securing Systems and Attached Devices in Oracle® Solaris 11.2 explains how to protect and monitor your Oracle Solaris system from unauthorized access.

  • Overview – Describes different methods of securing systems and devices from unauthorized access.

  • Audience –System administrators responsible for implementing security on the corporate network.

  • Required knowledge – Familiarity with security concepts and features that are supported in Oracle Solaris.

Product Documentation Library

Late-breaking information and known issues for this product are included in the documentation library at http://www.oracle.com/pls/topic/lookup?ctx=E36784.

Access to Oracle Support

Oracle customers have access to electronic support through My Oracle Support. For information, visit http://www.oracle.com/pls/topic/lookup?ctx=acc&id=info or visit http://www.oracle.com/pls/topic/lookup?ctx=acc&id=trs if you are hearing impaired.

Feedback

Provide feedback about this documentation at http://www.oracle.com/goto/docfeedback.