000 00588cam a2200109 4500
245 _aDeception technology
260 _c2018
520 _aThe article highlights the risk of sophisticated internal and external attacks has grown exponentially over the years. Today's security technologies seek primarily to defend a perimeter both firewalls and end point security cannot defend a perimeter 100% certainty.
650 _aTERRORISM
_x TECHNOLOGY
773 _aThe Journal of Counter Terrorism & Homeland Security International : Vol.24, No 1, 2018, pp.10-13(29)
945 _i61323-1001
_rY
_sY
999 _c36570
_d36570