Article ID | Journal | Published Year | Pages | File Type |
---|---|---|---|---|
458499 | Infosecurity | 2011 | 4 Pages |
Abstract
While many experts agree that whitelisting provides superior security to that of its antonym, blacklisting, there are concerns over its practicality and usability. Kevin Townsend puts the technologies head to head
Related Topics
Physical Sciences and Engineering
Computer Science
Computer Networks and Communications
Authors
Kevin Townsend,