KEYWORDS: Network security, Computer security, Information security, Information technology, Data communications, Solid state lighting, Control systems, Internet, Computing systems, Databases
The current methodologies of network communication security and in-transit data security being used within the enterprise do not adequately meet the ever growing threats from internal as well as external sources. A new approach called End-to-End Communications Security is being used to successfully close these security gaps and bring enterprises into regulatory and aduit compliance all at the same time.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.