This chapter discusses security considerations for distributed queuing.
This chapter also discusses security considerations for using clusters.