Search
Now showing items 1-1 of 1
Data-centric information security model for bringYour- own-device environment
(Strathmore, 2014-06)
Information security in the enterprise is challenging and has been considered . a
roadblock to enterprise innovation and adoption of concepts such as Bring- YourOwn-
Device (BYOD). One of the primary reasons for this is ...