Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium

x
  • Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 225
  • Last Modified:

One hundred points for Sunray

Courtesy of u2caufo for your answer at http://www.experts-exchange.com/Security/Q_20771093.html.

-Jason
0
Jason_Deckard
Asked:
Jason_Deckard
1 Solution
 
sunray_2003Commented:
Jason,


Thanks

Sunray
0

Featured Post

The Lifecycle Approach to Managing Security Policy

Managing application connectivity and security policies can be achieved more effectively when following a framework that automates repeatable processes and ensures that the right activities are performed in the right order.

Tackle projects and never again get stuck behind a technical roadblock.
Join Now