Home > Articles > Security > Network Security

  • Print
  • + Share This
From the author of

About this Article

This article is excerpted from Writing Information Security Policies by Scott Barman (New Riders Publishing), 2001, ISBN 157870264X). Refer to Chapter 8, "Viruses, Worms, and Trojan Horses," for more detailed information on the material covered in this article. Writing Information Security Policies also has a companion web site (http://www.barman.ws/wisp).

  • + Share This
  • 🔖 Save To Your Account