Many times we, as consumers of products for the online world, make assumptions about those products� security stance. Everyone would love to assume that any commercial piece of software that they purchase is �secure.� After all, it says so on the box. This is a common problem. What about the devices that have an implied security connotation when in fact they might not? Conversely, what about devices that appear to have no bearing on security but upon closer inspection are critical to an infrastructure?
© 2001-2024 Fundación Dialnet · Todos los derechos reservados