Sponsored by ComputerWeekly.com
This article in our Royal Holloway Information Security series assesses whether Resource Public Key Infrastructure can provide a framework for effective security. Access >>>
Table of contents
- The challenge of providing secure internet routing
- How does internet routing work?
- How can internet routing be secured?
Premium Content for Free.
More Premium Content Accessible For Free
Calculating Cloud ROI : From the Customer Perspective
Marketing hype claims that cloud computing can help any enterprise meet most IT service needs at a lower total cost of ownership (TCO) and higher ...
Benefits Management: How to increase the business value of your IT projects
Information systems and technology (IS/IT) are now essential components of the majority of businesses, allowing them to achieve greater efficiency of...
An Introduction to Quantum Lifecycle Management
Quantum Lifecycle Management (QLM) will enable the “Internet of Things” to have an impact on business and the world at large in a way similar to the ...