O'Reilly logo

MySQL™ and JSP™ Web Applications: Data-Driven Programming Using Tomcat and MySQL by James Turner

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Security, Part 1

Security is visited twice in this chapter. On your first visit, physical, network, and administrative security will be covered.

You're Paranoid, but Are You Paranoid Enough?

The first truism of security is that you match your level of paranoia to the degree of risk. If you're deploying a server that's going to live inside a secure intranet and store the company softball schedule, you can basically do whatever you please. The risk of intrusion is low, and the value of the data is minimal.

On the other hand, if you're deploying an e-commerce site on the open Internet that takes people's credit card information, you should assume that every 16-year-old with a computer has made it a personal mission to break into your site and pilfer ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required