Black Hills Information Security
Sturgis, South Dakota
CONTENTS
33.1 INTRODUCTION
It is often the case when humanity encounters something new and powerful that we jump in and embrace it without truly understanding the full implications of what we are dealing with. For example, when my father was a child he marveled at the beautiful glow from my grandfather’s watch with radium dials. My grandfather was part of the early Army experiments with nuclear testing and the watch was a gift. Years later, we understood the incredible danger associated with these beautiful timepieces. The point is, just because something is shiny ...
Get Cloud Computing Security now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.