Defense-In-Depth Applied to Laptop Security: Ensuring Your Data Remains Your Data

As the use and need for mobile computing grows in the global, interconnected economy, so does the need for mobile data protection. This paper illustrates how to apply a Defense-In-Depth strategy to protect laptop systems. Security topics addressed in this paper are confidentiality, integrity,...
Chris Grant
December 13, 2003

All papers are copyrighted. No re-posting of papers is permitted