Back to list
*Note: Email address will appear as "user domain ext" to prevent harvesting.
Security design methodology
Nov 02 2012 07:05PM
Alex Creek (acreek83 yahoo com)
Lately I've been doing some research into network security. For anyone with experience in network security design/build, is there a method for what to do first when planning? For example, should security be planned externally first then internally or vice versa? Which system is the most important...
[ more ]
Copyright 2010, SecurityFocus