First page
Back
Continue
Last page
Summary
Graphic
Unix Recommendations (Cont.)
Determine need for trust relationships
Enforce X-Windows access control
Implement shadow passwords
pwconv