I"ve just read a very good article about doing security evaluation of IT products . I liked this part specially:
Products Evaluation
I"ve just read a very good article about doing security evaluation of IT products . I liked this part specially: