22.12.2012 Views

Front cover - IBM Redbooks

Front cover - IBM Redbooks

Front cover - IBM Redbooks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

42 Lotus Security Handbook<br />

We are now ready to examine the recipes for designing a proper security<br />

infrastructure, which are security methodologies. These methodologies are<br />

<strong>cover</strong>ed in complete details in the next chapter and will build upon the knowledge<br />

you have acquired in the present chapter.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!