A set of security constraints is incorporated with this flexible debugging interface, to protect against intentional access to user's NCL processes that are running.
Note: For more information about using the EXC= parameter, see the Reference Guide.
Note: For more information, see the Reference Guide.
| Copyright © 2011 CA. All rights reserved. | Tell Technical Publications how we can improve this information |