“Top-down” versus “Bottom-up” – Different approaches to security
Autor: | Wilson, Piers |
---|---|
Zdroj: | In Network Security 2003 2003(12):17-19 |
Databáze: | ScienceDirect |
Externí odkaz: |
Autor: | Wilson, Piers |
---|---|
Zdroj: | In Network Security 2003 2003(12):17-19 |
Databáze: | ScienceDirect |
Externí odkaz: |