System Administration and Security
No information security can rely on the standard list of physical, personnel and technical security measures. Unfortunately, unless the information system is diligently administered, the quality of the system security will rapidly deteriorate. This is an inconvenient aspect of security all too often overlooked by politicians and administrators trying to cut costs.
KeywordsOpen Source Software Security Policy Certification Process Audit Trail Soft System Methodology
Unable to display preview. Download preview PDF.