Home > Articles > Security > Software Security

  • Print
  • + Share This
Like this article? We recommend

Acknowledgments

The author would like to recognize the following individuals for their contributions: senior personnel from Sun Services, Engineering, and Sun Corporate, and IT Security for reviewing this article and providing helpful comments (in particular, Joel Weise, Martin England, Glenn Brunette, Matthias Kussinger, Larry Dunn, Mark Lawler, Steve Gillis, and Brad Powell). Sun BluePrints program contributors in editing and revising are very much appreciated (in particular, Dan Barnett and Billie Markim).

  • + Share This
  • 🔖 Save To Your Account