Information security management: physical token protection - part 2

As a corollary requirement, when considering physical tokens, functionality is directly related to capabilities. Consequently, physical token appropriateness should be evaluated based on the set of attributes applicable to the existing set of...
 •  0 comments  •  flag
Share on Twitter
Published on October 12, 2010 06:19
No comments have been added yet.