Next | Prev | Up | Top | Contents | Index

How to Use This Guide

You will probably use the parts of this document separately.

If you are responsible for backups, refer to Part I. Read Chapter 1 if you have yet to implement a backup policy, Chapter 2 to learn details on the use of a particular backup tool, and Chapter 3 if you are having trouble with backups.

If you are responsible for security, read Part II, Chapter 4 for details on configuring IRIX host security, and Chapter 5 if you are responsible for network security as well.

If you are responsible for system auditing, read Part III, Chapter 6.

If you are responsible for monitoring system usage, read Part III, Chapter 7.



Next | Prev | Up | Top | Contents | Index