Article ID Journal Published Year Pages File Type
9660612 Information Security Technical Report 2005 8 Pages PDF
Abstract
Further impacting factors are growing in areas like Spyware, Adaware, and this linked to challenges that exist to support Patching and Fixing dictate that the approach to operational security, especially outside of the perimeter, is essential to have a mirrored set of logical controls deployed if security is to be realised to at all end-points.
Related Topics
Physical Sciences and Engineering Computer Science Computer Networks and Communications
Authors
,