Bookshelf Home | Contents | Index | PDF | ![]() ![]() |
This chapter contains recommendations for implementing auditing in a Siebel Business Applications deployment so that suspicious activities are detected. This chapter contains the following topics: |
![]() ![]() |
Siebel Security Hardening Guide | Copyright © 2014, Oracle and/or its affiliates. All rights reserved. Legal Notices. | |