posted by Sakila The Librarian
on
Fri 10 Jul 2009 22:00 UTC
Tags:
MySQL security best practices often assume restricted access to the physical server and restrictive file system privileges. However, OEM's and ISV's who bundle and distribute their application with MySQL have no control over where the application is installed. This session will provide silent installation instructions, common deployment strategies and recommendations for securing your data.