44th Annual 2010 IEEE International Carnahan Conference on Security Technology 2010
DOI: 10.1109/ccst.2010.5678718
|View full text |Cite
|
Sign up to set email alerts
|

Design, implementation and migration of security systems as an extreme project

Abstract: Decision Trees, algorithms, software code, risk management, reports, plans, drawings, change control, presentations, and analysis-all useful tools and efforts but time consuming, resource intensive, and potentially costly for projects that have absolute schedule and budget constraints.What are necessary and prudent efforts when a customer calls with a major security problem that needs to be fixed with a proven, off-the-approval-list, multi-layered integrated system with high visibility and limited funding and … Show more

Help me understand this report

This publication either has no citations yet, or we are still processing them

Set email alert for when this publication receives citations?

See others like this or search for similar articles