Guidelines for designing IT security management tools
Proceedings of the 2nd ACM Symposium on Computer Human Interaction for Management of Information Technology
Heuristics for evaluating IT security management tools
Proceedings of the Seventh Symposium on Usable Privacy and Security
Physical access control administration using building information models
CSS'12 Proceedings of the 4th international conference on Cyberspace Safety and Security
Hi-index | 0.00 |
As information security professionals we are well aware of the many different types of threats and potential threats to information security. We are also faced with a packed market of IT security products aimed at countering these threats. In this article I'd like to prompt some thoughts about this market and its likely future.