Introduces security concepts, outlines procedures for administering security and controlling privileges.
Includes procedures to maintain the security of your system.
Describes how to assign privileges to users that override the default restrictions. It explains the file privilege mechanism and how these privileges are administered.
Explains how to assign roles and otherwise enable users to run command line facilities reserved for administrators.