| 
   |||
| 
 1. Introduction to Solaris Trusted Extensions Software 2. Logging In to Trusted Extensions (Tasks) 3. Working in Trusted Extensions (Tasks)  | 
      
	 Who Should Use This BookThis book is for all users of Trusted Extensions. As a prerequisite, you must be familiar with the Solaris OS and one of the following desktops: 
 You must also be familiar with the security policy of your organization.  | 
   ||
         
  |