Expand TOC
HP OpenVMS Guide to System Security
Legal Notice
Preface
Security Overview
Security for the User
Security for the System Administrator
Managing the System and Its Data
Managing System Access
Controlling Access to System Data and Resources
Security Auditing
System Security Breaches
Securing a Cluster
Security in a Network Environment
Using Protected Subsystems
Assigning Privileges
Protection for OpenVMS System Files
Running an OpenVMS System in a C2 Environment
Introduction to C2 Systems
Trusted Computing Base (TCB) for C2 Systems
Checklist for Generating a C2 System
Alarm Messages
Glossary
Index