Security Intelligence
Autor
Qing Li
, Gregory Clark
Similar to unraveling a math word problem, this book guides you through a process that translates each security goal into a set of security variables, substitutes each variable with a specific security technology domain, formulates the equation that is the deployment strategy, and then verifies the solution against the original problem.