About the
(ISC)² Blog

« Making the users accountable | Main | Federal Cloud Computing: The Definitive Guide for Cloud Service Providers »

10 December 2012

Comments

A much needed clarification of a complex topic, the subtlety of which is not always well understood, even among CISSPs. Thanks!

The comments to this entry are closed.

Recent Contributors

Past Contributors