Introduction to the main terms and concepts, architecture, features, and
capabilities of Seeker
Information that helps you to make the most out of Seeker for securing your
applications
Requirements, installation and setup instructions for the Seeker server on
the supported platforms
Deployment, configuration, management, and reference information for Seeker Agents.
Administration, configuration, and management tasks needed for the optimal
use of Seeker
Recommended best practices for implementing Seeker in your
organization
Information that helps you resolve various issues that might occur while using Seeker.
Information about the new and enhanced features introduced in each release
A glossary of Seeker terms and concepts