1 Reply Latest reply on Feb 20, 2008 5:45 PM by jwcone

    How do I Harden JBOSS in a secure environment

    James Wright Newbie

      In general, what configuration and deployment steps did you take in implementing COTS and open source products in a secure environment within a DoD network?

      If someone can direct me to a white paper on this type of configuration it'd be grately appreciated!