Report - Understanding IT Perimeter Security - redbooks.ibm.com · 2 Understanding IT Perimeter Security The perimeter was still well defined. However, ph ysical security was no longer sufficient.

Please pass captcha verification before submit form