Database Reference
In-Depth Information
Summary
In this chapter, we discussed various security aspects of the Neo4j server. We talked about
the threats and procedures/methods to secure our Neo4j deployment. We also talked about
the flexibility provided by Neo4j for extending its functionality by implementing plugins
and extensions.
Search WWH ::




Custom Search