This topic introduces security concepts, describes
the elements of the security policy, provides an
overview of kernel and system architectures.
It also describes user-visible security commands such as
Explains how to configure and work with the
command line shells.
Sample configuration files are included.