Wireless Security
Name:
Email:
*Note: Email address will appear as "user domain ext" to prevent harvesting.
Subject:
Message:
 
RE: Wireless Infrastructure Nov 01 2011 03:12PM
Kripton, Bruce (Kripton Bruce scrippshealth org)
Seth,

The answer is always "it depends", followed shortly by the comment that
you're looking at the tip of an Iceberg of unknown size :-)

I have seen and implemented both of the scenarios you outlined below
many times, and each was purpose built predicated upon security and or
regulatory requireme...

[ more ]  
 

Privacy Statement
Copyright 2010, SecurityFocus