General process of security administration  Using the “sa” login

Chapter 13: Getting Started With Security Administration in Adaptive Server

Recommendations for setting up security

The following describes logins and how they relate to security.





Copyright © 2005. Sybase Inc. All rights reserved. Using the “sa” login

View this book as PDF