Shoe Bombers on the Network Part One : Detection Mechanisms Charles Herring

Comparing how physical security caught the shoe bomber to how we go about catching network threats.

Subscribe to heuristics