Читать книгу Fog Computing - Группа авторов - Страница 49
1.5.5 Security
ОглавлениеIn large-scale MFC systems, the classic perimeter-based security approach will not suffice, security strategies in MFC must account for various factors: physical, end-to-end, and also monitoring and management.