This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
The Rise of the Gadgets
September-October 2003 (vol. 1 no. 5)
pp. 78-81
Iv? Arce, Core Security Technologies

So you think that to protect your IT infrastructure effectively you merely need to deploy a streamlined assess, patch, and audit process for your routers, servers, and workstations? Think again! Although it is indisputable that we must constantly monitor and patch networking hardware, servers, and workstations against the latest and most threatening bugs, a slowly growing trend might prove that strategy to be flawed, or at least not comprehensive.

Citation:
Iv? Arce, "The Rise of the Gadgets," IEEE Security & Privacy, vol. 1, no. 5, pp. 78-81, Sept.-Oct. 2003, doi:10.1109/MSECP.2003.1236241
Usage of this product signifies your acceptance of the Terms of Use.