This chapter describes how to configure Adaptive Server to ensure that all data is secure and confidential.
View this book as PDF