For example, if a system doesn’t allow any two people to log on to it at the same time, there’s no need to apply a concurrent session control.
- Chapter 5 Protecting Security of Assets
- from CISSP (ISC)2 Certified Information Systems Security Professional Official Study Guide, 7th Edition
- Publisher: Sybex
- Released: September 2015
list as example.
Share this highlighthttp://www.safaribooksonline.com/a/cissp-isc2-certified/10971121/