Abstract
Computer security is one issue that routinely makes the news and keeps administrators busy. Particularly when managing web servers, security needs to be a constant theme because of the increased vulnerability of systems connected to the Internet. Failure to properly secure your system will, sooner or later (probably sooner), result in someone getting into it. If you’re “lucky,” the hacker will just snoop around. If the hacker is criminal or malicious, he can steal your data, rob your company and customers, use your system as a launching pad for attacking other systems, and ultimately corrupt or destroy your system.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Rights and permissions
Copyright information
© 2004 Michael Wessler, Erin Mulder, Rob Harrop, and Jan Machacek
About this chapter
Cite this chapter
Wessler, M., Mulder, E., Harrop, R., Machacek, J. (2004). Configuring Enterprise Security. In: Oracle Application Server 10g. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4302-0744-3_20
Download citation
DOI: https://doi.org/10.1007/978-1-4302-0744-3_20
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-59059-235-9
Online ISBN: 978-1-4302-0744-3
eBook Packages: Springer Book Archive