This section describes the chapters in this book.
Chapter 1, Security Overview describes the security issues when installing the Trusted Solaris operating environment on one or more hosts.
Chapter 2, Installation Task Maps identifies where various installation tasks and methods are documented.
Chapter 3, Basic Procedures describes procedures specific to the Trusted Solaris environment when installing and configuring Trusted Solaris software.
Chapter 4, Installing a Workstation provides instructions for shutting down a Trusted Solaris host and installing the Trusted Solaris 8 operating environment.
Chapter 5, Configuring a Workstation with No Name Service provides step-by-step instructions for installing a host that will use files, not a naming service, for administration.
Chapter 6, Configuring the NIS+ Domain provides step-by-step instructions for installing a server for the NIS+ naming service.
Chapter 7, Configuring a NIS Network provides step-by-step instructions for installing a server for the NIS naming service.
Chapter 8, Configuring a NIS or NIS+ Client provides step-by-step instructions for installing a client for the naming services. It includes instructions for setting up a NIS slave server.
Chapter 9, Installing Trusted Solaris Over a Network lists differences in Trusted Solaris network installation from Solaris network installation, including JumpStart and Custom JumpStart.
Appendix A, Site Security Policy addresses site security policy and places the Trusted Solaris operating environment in the context of wider organizational and site security.
Appendix B, Checklists for Configuring and Installing Trusted Solaris provides a checklist for the install team when installing and configuring the Trusted Solaris environment.
Appendix C, Example Worksheets provides sample answers to Trusted Solaris installation program questions.
Glossary defines selected terms and phrases used in this book.