6. Determine ftp information  8. Identify the change control requirements

Chapter 2: Getting Started

7. Plan the security requirements

Review your security requirements with your security administrator. You may also need to consult with your network administrator.





Copyright © 2005. Sybase Inc. All rights reserved. 8. Identify the change control requirements

View this book as PDF