1.
Griffy-Brown C, Lazarikos D, Chun M. How Do You Secure an Environment Without a Perimeter? Using Emerging Technology Processes to Support Information Security Efforts in an Agile Data Center. JABE [Internet]. 2016 Mar. 1 [cited 2024 Oct. 5];18(1). Available from: https://mail.articlegateway.com/index.php/JABE/article/view/832