Implementation  Introduction


Chapter 2: Configuring Security Database Connections

This chapter describes how to configure the database connections required to implement e-Biz Impact security.





Copyright © 2005. Sybase Inc. All rights reserved. Introduction

View this book as PDF