Security, Part 1
Security is visited twice in this chapter. On your first visit, physical, network, and administrative security will be covered.
You're Paranoid, but Are You Paranoid Enough?
The first truism of security is that you match your level of paranoia to the degree of risk. If you're deploying a server that's going to live inside a secure intranet and store the company softball schedule, you can basically do whatever you please. The risk of intrusion is low, and the value of the data is minimal.
On the other hand, if you're deploying an e-commerce site on the open Internet that takes people's credit card information, you should assume that every 16-year-old with a computer has made it a personal mission to break into your site and pilfer ...
Get MySQL™ and JSP™ Web Applications: Data-Driven Programming Using Tomcat and MySQL now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.