7. Determine ftp information  9. Identify the change control requirements

Chapter 2: Planning Your Installation

8. Plan the security requirements

Review your security requirements with your security administrator. You may also need to consult with your network administrator.





Copyright © 2005. Sybase Inc. All rights reserved. 9. Identify the change control requirements

View this book as PDF