If you don't like their rules, whose would you use?
8.1 How We Got Here
8.4 Types of Threats
8.6 The Rules
8.11 Further References
(In)security is everywhere. Security is a critical component of an IT Manager's life. Almost every decision he makes will have to be evaluated at some point for its security implications. Hiring a new programmer? How much access should that person have? Installing a new server? Who is allowed to access it? Making sure ...