Main | Untrusted hosts »

Preface

I’ve been working in the area of network security and a bit in trusted operating systems for the last eleven years or so. In addition, I’ve been teaching computer security for the last two years. Teaching Information Assurance courses has really forced me to broaden my background. Through the material and student’s comments and questions, it has caused me to look at many things in a differnt light than I would have from my industry perspective.

In the blog, I want to capture some of those insights into keeping information trustworthy resulting from class research, comments, and just operating in today’s world.

Comments (1)

Dr. H.,

The following may be of relevant interest.

The owner of the Healthcare IT Guy blog invited me to submit a guest article about the importance of data ownership to healthcare informatics. The article has been published at:

http://www.healthcareguy.com/

About

This page contains a single entry from the blog posted on December 7, 2006 9:22 AM.

The next post in this blog is Untrusted hosts.

Many more can be found on the main index page or by looking through the archives.

Powered by
Movable Type 3.34