Article ID | Journal | Published Year | Pages | File Type |
---|---|---|---|---|
9660612 | Information Security Technical Report | 2005 | 8 Pages |
Abstract
Further impacting factors are growing in areas like Spyware, Adaware, and this linked to challenges that exist to support Patching and Fixing dictate that the approach to operational security, especially outside of the perimeter, is essential to have a mirrored set of logical controls deployed if security is to be realised to at all end-points.
Related Topics
Physical Sciences and Engineering
Computer Science
Computer Networks and Communications
Authors
John Walker,