Core Business Sector


In less than a century, airplanes have gone from being an oddity to being vitally important to the economy. Information technology has done the same in less time and continues to grow in importance. We have been more than a bit lazy. I often wonder what the effect of a worm with the infection rate of Blaster that overwrote (not deleted, overwrote) every location on the hard drive of an infected computer four hours after infection would be. If the Congress of the United States did not vote on a bailout package for the airline industry, IT should not expect one. One of the primary keys to survival in business over the next few years will be managing the flow of information so that resources are available when they are needed with full integrity, while the confidentiality of proprietary and sensitive information is maintained. It is a big task, so we had better get started.


Stephen Northcutt and the authoring team



    Inside Network Perimeter Security
    Inside Network Perimeter Security (2nd Edition)
    ISBN: 0672327376
    EAN: 2147483647
    Year: 2005
    Pages: 230

    Similar book on Amazon

    flylib.com © 2008-2017.
    If you may any questions please contact us: flylib@qtcs.net