Disclaimer


Understanding the security model and exposures of your information system is key to protecting your information assets. You should now have a much better idea of what you need to do to help ensure the integrity of your system. However, one point that we want to reiterate – if you believe that you've guarded against every possible vulnerability, someone, somewhere, is going to find a weakness that you hadn't considered. Security is dynamic and fluid. You have to be proactive in both monitoring and reinforcing your defenses. The technology by itself will not do it all for you – you need a complete set of security policies, and you have to actively apply those policies; getting the technology to do the work for you, synergistically and efficiently. But the technology is not a substitute for you and your practices.




Professional IBM WebSphere 5. 0 Applicationa Server
Professional IBM WebSphere 5. 0 Applicationa Server
ISBN: N/A
EAN: N/A
Year: 2001
Pages: 135

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net