Now showing items 1-1 of 1
Data-centric information security model for bringYour- own-device environment
Information security in the enterprise is challenging and has been considered . a roadblock to enterprise innovation and adoption of concepts such as Bring- YourOwn- Device (BYOD). One of the primary reasons for this is ...