Building a trusted computing base
Administration
43.
Headless vs. local Administration
44.
Users and Identities
45.
Credentials and their storage
46.
Should "su" ask for the root password?