Building An Information Security Policy Part 3: Logical And Physical Design
NetworkComputing.com
In my previous blog, I discussed key points for the selection of appropriate hardware and software in order to build and maintain an effective security policy. In this post, I will cover security considerations when designing the physical and logical