Use these references to find step-by-step instructions for setting up system security.
Chapter 17, Securing Files (Tasks)
Chapter 18, Securing Systems (Tasks)
Chapter 19, Role-Based Access Control
Chapter 20, Using Authentication Services (Tasks)
Chapter 24, Using Automated Security Enhancement Tool (Tasks)