|Best Practices for Creating a Secure IBM Lotus Domino Infrastructure|
Andrew Pollack / 22.01.2008 19:30:00
Do you use the same agent signing ID for the most trivial applications as for your most critical ones? Knowing how to do something is only half the battle. Knowing when to do it just as important. True security is about more than ACLs, Reader Names, and Encryption. It's about defining the standards and practices under which your applications will be built and and your servers managed. Learn how to apply development techniques based on risk categories rather than on a negotiation between a junior developer and a business unit manager. Learn how the administrative tools in Lotus Domino can let you safely delegate management tasks without giving away the keys to the kingdom. Protect your team as well as you protect your applications. Whether you're on Lotus Domino 6.x, 7.x, or 8.x this session has something to offer you as an administrator.
Please log in to access full content/presentation