Articles Archive for January 2009
Guidelines
The new approach proposed opens new capabilities and changes significantly the usage of the security mechanisms for Information systems designers and developers, Security experts and auditors, Deployment teams and End users. To facilitate an early …