Sorry, we do not have enough data to show an influence graph for this author.
eeks prior to a scheduled mainte-n a n c e w i n d o w , a n e t w o r k administrator at Cable and Wireless navigated to Cisco's Web site and downloaded new IOS code for their 12000 series gig routers. Days of rigorous testing resulted in an expected smooth installation of the new software. Unknown to the network administrator or anyone at Cable and… (More)
Threats to information technology are ever increasing and many organizations are spending much money and time in attempting to fix security problems. Before one can think about remediation, assets worth protecting and knowing what to protect those assets from must be defined. OCTAVE ® characterizes a self-directed methodology for defining an organization's… (More)