3.3. Define and map security roles (e.g., Java enterprise security).
Prev
Chapter 3. Application Assembly/Deployment and Cell Configuration/Resource Allocation
Next
3.3. Define and map security roles (e.g., Java enterprise security).
blah