Home > Articles

  • Print
  • + Share This
This chapter is from the book

Deployment and Operations Planning

Think it’s too early in the game to start considering how the system is going to be deployed and operated? Guess again. We’ll come back to this in a lot more detail in Chapter 7, “Operating Software Securely,” but for now it is important for us to be sure to understand how our application is going to get deployed and operated. For example, how are our application components going to integrate into the intrusion detection infrastructure in the organization?

  • + Share This
  • 🔖 Save To Your Account