Securing Systems and Attached Devices in Oracle® Solaris 11.2 explains how to protect and monitor your Oracle Solaris system from unauthorized access.
Overview – Describes different methods of securing systems and devices from unauthorized access.
Audience –System administrators responsible for implementing security on the corporate network.
Required knowledge – Familiarity with security concepts and features that are supported in Oracle Solaris.
Late-breaking information and known issues for this product are included in the documentation library at http://www.oracle.com/pls/topic/lookup?ctx=E36784.
Oracle customers have access to electronic support through My Oracle Support. For information, visit http://www.oracle.com/pls/topic/lookup?ctx=acc&id=info or visit http://www.oracle.com/pls/topic/lookup?ctx=acc&id=trs if you are hearing impaired.
Provide feedback about this documentation at http://www.oracle.com/goto/docfeedback.