Difference between revisions of "Category:BP7 Publish operational security guidelines"

Jump to: navigation, search
m (Undo revision 61295 by C4touBocsi (Talk))
(One intermediate revision by one other user not shown)
(No difference)

Latest revision as of 12:03, 22 May 2009


Security does not end when an application is completed and deployed in a production environment. Making the most out of existing network and operational security investments requires that you inform and educate those tasked with monitoring and managing the security of running systems with advice and guidance on the security requirements your application demands, and how best to make use of the capabilities you’ve built into your application.

Pages in category "BP7 Publish operational security guidelines"

The following 2 pages are in this category, out of 2 total.