Exit Print View
This chapter explains the key elements of Trusted Extensions. This chapter covers the following topics:
Visible Features of Trusted Extensions
Device Security in Trusted Extensions
Files and Applications in Trusted Extensions
Password Security in the Oracle Solaris OS
Workspace Security in Trusted Extensions