Searched for: "software configuration management using ontologies"
About 3 results for "software configuration management using ontologies"
Information security management, as defined in ISO 27001, deals with establishing, implementing, operating, monitoring, reviewing, maintaining, and improving an information securit...
Mark Underwood looks at the state of SNMP utilization in today's networks, perceived risks, and how its role is reflected in the design of recent hardware.
Blogger Mark Underwood lays out the ways you can use SNMP agents to monitor network devices, and even set it up to send software alerts as well.