Article ID | Journal | Published Year | Pages | File Type |
---|---|---|---|---|
459329 | Infosecurity | 2007 | 4 Pages |
Abstract
How does end point security, an increasingly important way of protecting resources, integrate with other systems? Steve Gold asks four vendors how they tie things together
Related Topics
Physical Sciences and Engineering
Computer Science
Computer Networks and Communications
Authors
Steve Gold,