This chapter describes tasks that require exclusive
access to your system. Use only the sections on your checklist for
the process of securing, shutting down, and applying the changes
to your system.
CAUTION: You must use a checklist to determine which tasks
to perform. If you started without a checklist, return to Chapter 2 “Task Checklists” and select the
checklist that is appropriate for your task. Perform only the steps
in the sections that appear on your checklist.