Chapter 10. Security
Terms you'll need to understand:
Authentication
Execution Control List (ECL)
Encryption
Role
Form Read Access list
Form Create list
View Access list
Consistent Access Control List (ACL)
Effective access
Extended ACL
Administration server
Sign fields
Names fields
Readers fields
Authors fields
Directory access
Techniques you'll need to master:
Methods of Database encryption
Use of Database roles
Understanding Mail encryption
Choosing a method of Document encryption
Uses of Form access control
Uses of Section access control
Uses of View access control
Techniques for Workstation security—Execution Control List (ECL)
Understanding ACLs and replication
Lotus Notes/Domino has a long-standing reputation as a robust, secure platform for application development. ...
Get Lotus Notes® and Domino® 6 Application Development Exam Cram™ 2 (Exams 610, 611, and 612) now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.