Deception technology
Material type: TextPublication details: 2018Subject(s): In: The Journal of Counter Terrorism & Homeland Security International : Vol.24, No 1, 2018, pp.10-13(29)Summary: The article highlights the risk of sophisticated internal and external attacks has grown exponentially over the years. Today's security technologies seek primarily to defend a perimeter both firewalls and end point security cannot defend a perimeter 100% certainty.Item type | Current library | Call number | Copy number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|
Journal Article | Mindef Library & Info Centre Journals | TERRORISM (Browse shelf(Opens below)) | 1 | Not for loan | 61323-1001 |
The article highlights the risk of sophisticated internal and external attacks has grown exponentially over the years. Today's security technologies seek primarily to defend a perimeter both firewalls and end point security cannot defend a perimeter 100% certainty.
There are no comments on this title.
Log in to your account to post a comment.