[ Bottom of Page | Previous Page | Next Page | Contents | Index | Library Home | Legal | Search ]

Security Guide

About This Book

This book provides system administrators with information about user and group, file, system, and network security for the AIX operating system. This guide contains information about how to perform such tasks as changing permissions, setting up authentication methods, and configuring the Trusted Computing Base environment and Controlled Access Protection Profile (CAPP) with Evaluation Assurance Level 4+ (EAL4+) features.

The AIX 5L Version 5.2 Security Guide contains the following parts: Standalone System Security, Network and Internet Security, and the Appendixes.

Who Should Use This Book

This book is intended for system administrators and IT security managers.

Highlighting

The following highlighting conventions are used in this book:

Bold Identifies commands, subroutines, keywords, files, structures, directories, and other items whose names are predefined by the system. Also identifies graphical objects such as buttons, labels, and icons that the user selects.
Italics Identifies parameters whose actual names or values are to be supplied by the user.
Monospace Identifies examples of specific data values, examples of text similar to what you might see displayed, examples of portions of program code similar to what you might write as a programmer, messages from the system, or information you should actually type.

Case-Sensitivity in AIX

Everything in the AIX operating system is case-sensitive, which means that it distinguishes between uppercase and lowercase letters. For example, you can use the ls command to list files. If you type LS, the system responds that the command is "not found." Likewise, FILEA, FiLea, and filea are three distinct file names, even if they reside in the same directory. To avoid causing undesirable actions to be performed, always ensure that you use the correct case.

ISO 9000

ISO 9000 registered quality systems were used in the development and manufacturing of this product.

Related Publications

The following publications contain related information:

[ Top of Page | Previous Page | Next Page | Contents | Index | Library Home | Legal | Search ]