Like this article? We recommend
About this Article
This article is excerpted from Writing Information Security Policies by Scott Barman (New Riders Publishing), 2001, ISBN 157870264X). Refer to Chapter 8, "Viruses, Worms, and Trojan Horses," for more detailed information on the material covered in this article. Writing Information Security Policies also has a companion web site (http://www.barman.ws/wisp).
< Back
Page 2 of 2