1.
How Do You Secure an Environment Without a Perimeter? Using Emerging Technology Processes to Support Information Security Efforts in an Agile Data Center. JABE. 2016;18(1). Accessed April 23, 2026. https://articlearchives.co/index.php/JABE/article/view/542