October 20, 2005
Author(s)
Murugiah P. Souppaya, Paul M. Johnson, Karen Kent
… environments, such as for a large enterprise or a home office. It describes the need to document, implement, … computer security, COTS, email, encryption, firewall, hardening, IPsec, lockdown, malware, Microsoft, operating …