SearchSecurity.com

Special considerations for network-based access control

In this excerpt of Chapter 13: Access Control from Information Security: Design, Implementation, Measurement, and Compliance author Timothy P. Layton examines how network services should be managed to ensure unauthorized access is prevented and provides questions that should be considered when establishing network-based access controls.

    Requires Free Membership to View

All Rights Reserved, Copyright 2000 - 2013 , TechTarget | Read our Privacy Statement