Author:Robertson, J; Lessing, M; Nare, SDate:Jul 2008The military’s decision to move from proprietary software to commercially available software leaves the military’s Information Technology security vulnerable and potentially unprotected. To be sufficiently prepared to these threats, the ...Read more