IT Governance, Risk, and Compliance:



March 3, 2009  4:05 AM

Peer-to-Peer Networking – Part 2

Posted by: Robert Davis
Applications, HDLC, Infrastructure, Network Access Protection, P2P, Password-Protected Share, Peer-to-Peer, Performance, Privacy, Security Risks, Share-level Security, X.25

Maybe, experientially, the small branch office with a P2P network has escaped a security incident since deployment. Even so, a functional P2P network unintentionally presents itself as a potential target waiting for someone capable of pulling the threat trigger to introduce a potent security...


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: