Securing data.............................................................................................42
Physical lock............................................................................................................................................42
Disk encryption........................................................................................................................................43
Disk file wiping........................................................................................................................................46
Erasing hard disk data.............................................................................................................................48
Out-of-service wiping..............................................................................................................................49
Statement of volatility.............................................................................................................................50
Security solutions.......................................................................................52
Print Release............................................................................................................................................52
Secure Held Print Jobs.............................................................................................................................52
Card Authentication................................................................................................................................52
Smart Card authentication......................................................................................................................52
Security scenarios......................................................................................54
Troubleshooting.........................................................................................59
Login troubleshooting.............................................................................................................................59
LDAP troubleshooting.............................................................................................................................62
Appendix....................................................................................................66
Index..........................................................................................................77
3