Читать книгу Fog Computing - Группа авторов - Страница 49

1.5.5 Security

Оглавление

In large-scale MFC systems, the classic perimeter-based security approach will not suffice, security strategies in MFC must account for various factors: physical, end-to-end, and also monitoring and management.

Fog Computing

Подняться наверх