{"title":"重新思考现代端点管理","authors":"Dan Richings","doi":"10.12968/s1353-4858(22)70060-8","DOIUrl":null,"url":null,"abstract":"Four decades after the first PC rolled off the production line, today's systems are an order of magnitude faster and more functional than the originals. But how vulnerable are they to attack?","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"30 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Rethinking endpoint management for the modern age\",\"authors\":\"Dan Richings\",\"doi\":\"10.12968/s1353-4858(22)70060-8\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Four decades after the first PC rolled off the production line, today's systems are an order of magnitude faster and more functional than the originals. But how vulnerable are they to attack?\",\"PeriodicalId\":100949,\"journal\":{\"name\":\"Network Security\",\"volume\":\"30 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Network Security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.12968/s1353-4858(22)70060-8\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Network Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.12968/s1353-4858(22)70060-8","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Four decades after the first PC rolled off the production line, today's systems are an order of magnitude faster and more functional than the originals. But how vulnerable are they to attack?