system security
Device Allocation Commands
administering
Managing Device Allocation Task Map
Constraining Password Encryption Algorithms in a Heterogeneous Environment
Device-Clean Scripts
Allocating a Microphone
Deallocating a Microphone
Policies for Verified Boot
Password Encryption
Monitoring and Restricting root Access
How to Restrict and Monitor root Logins
How to Authorize Users to Allocate a Device
Allocating a CD-ROM Drive
How to Mount an Allocated Device
Device-Clean Script for Tapes