Warning and disclaimer

Every effort has been made to make this book as complete and accurate as possible, but no warranty or fitness is implied regarding any information and/or products referenced in this book. Many of the authors, at the time of publishing, were employees of IBM. The IBM Corporation provides a set of rules regarding publishing that applies to each employee. The IBM employees followed each of these rules as stated by IBM. Based on those rules the following statements are listed:

  • This book is not sponsored by IBM/Lotus or ISSL.
  • The IBM employees received IBM legal permission to publish this book using an outside IBM Press publisher.
  • Purchase and read this book at your own risk.
  • Every effort has been attempted to obtain permissions for extracts and quotes whenever possible. See listed URLs for quote sources.
  • The products referenced or mentioned in this book are listed for informational purposes only. The publisher and authors may have received demo copies to review. Many different vendors are mentioned in this book and many vendor products are used for reference. The publisher and authors do not recommend any product, software, or hardware. You, the owner of your hardware, software, and data are responsible to make a determination of what is best for you. The authors DO advise that you take careful consideration in determining your software, security, and infrastructure needs and review more than just one vendor.
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.119.248.13