This topic introduces security concepts, describes the elements of the security policy, provides an overview of kernel and system architectures. It also describes user-visible security commands such as login(1), passwd(1), and listusers(1).
Explains how to configure and work with the sh(1), ksh(1), and csh(1) command line shells. Sample configuration files are included.