skip book previous and next navigation links
go up to top of book: HP OpenVMS Guide to System SecurityHP OpenVMS Guide to System Security
go to beginning of part: Security for the System AdministratorSecurity for the System Administrator
go to beginning of chapter: Using Protected SubsystemsUsing Protected Subsystems
 
go to next page: Applications for Protected SubsystemsApplications for Protected Subsystems
end of book navigation links

Advantages of Protected Subsystems  



Using protected subsystems offers several advantages:
 
go to next page: Applications for Protected SubsystemsApplications for Protected Subsystems