Building An Information Security Policy Part 2: Hardware and Software
NetworkComputing.com
In my previous blog, I outlined how understanding the roles of network devices is important for building an effective security policy. In this post, I will cover considerations when selecting hardware and software for network devices. After an