This chapter describes how to assess and monitor security in an SOA application.
This chapter includes the following sections:
Section 14.1, "Introduction"
Section 14.2, "Monitoring Security"