Building an Information Security Policy Part 4: Addresses and Identifiers
NetworkComputing.com
The first three posts in this series have focused on many physical aspects of building a secure network: choosing hardware and software, and understanding your physical topology in order to apply your security policy. In this post, I will cover the key