Shoe Bombers on the Network Part One : Detection Mechanisms
Charles Herring
Subscribe to heuristics
Comparing how physical security caught the shoe bomber to how we go about catching network threats.