Who Should Use This Book
This book is for knowledgeable system administrators and security administrators who are installing
Trusted Extensions software. The level of trust that is required by your site
security policy, and your level of expertise, determines who can perform the configuration
tasks.