Tables
1. Typographic Conventions used in this Book ix
1-1. Encryption Key Summary .......1-7
2-1. Minimum Software Requirements for Linux 2-2
2-2. Minimum Software Requirements for
Windows ............2-3
6-1. Errors that are reported by the encryption
key manager ...........6-5
7-1. Audit record types that the Encryption Key
Manager writes to audit files ......7-5
7-2. Audit record types by audited event 7-7
8-1. Metadata Query Output Format .....8-2
vii