Image from Google Jackets

Deception technology

Material type: TextTextPublication details: 2018Subject(s): In: The Journal of Counter Terrorism & Homeland Security International : Vol.24, No 1, 2018, pp.10-13(29)Summary: The article highlights the risk of sophisticated internal and external attacks has grown exponentially over the years. Today's security technologies seek primarily to defend a perimeter both firewalls and end point security cannot defend a perimeter 100% certainty.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Copy number Status Date due Barcode
Journal Article Mindef Library & Info Centre Journals TERRORISM (Browse shelf(Opens below)) 1 Not for loan 61323-1001

The article highlights the risk of sophisticated internal and external attacks has grown exponentially over the years. Today's security technologies seek primarily to defend a perimeter both firewalls and end point security cannot defend a perimeter 100% certainty.

There are no comments on this title.

to post a comment.