Corro'll (Kuh'rel) Driskell

69%
Flag icon
The new architecture therefore expands our defenses to two additional perimeters: the data itself and the users who have access to the data.
Managing Risk and Information Security: Protect to Enable
Rate this book
Clear rating