From Wikipedia, the free encyclopedia

Contested deletion

This article should not be speedily deleted for lack of asserted importance because... (your reason here) -- RobertNSage ( talk) 14:16, 1 April 2014 (UTC) reply

It "Data in Transit" is a complicated subject, it will take time to grow and develope as the IT security professionals move to develope different ways to execute secure practices. Securing "data at rest" takes one methodolgy and "data in transit" takes another.

Notability

This is definitely a notable term/concept. We need to choose a few references. I have linked to this article from over 20 other IT-related articles. ~ Kvng ( talk) 17:15, 28 December 2015 (UTC) reply

From Wikipedia, the free encyclopedia

Contested deletion

This article should not be speedily deleted for lack of asserted importance because... (your reason here) -- RobertNSage ( talk) 14:16, 1 April 2014 (UTC) reply

It "Data in Transit" is a complicated subject, it will take time to grow and develope as the IT security professionals move to develope different ways to execute secure practices. Securing "data at rest" takes one methodolgy and "data in transit" takes another.

Notability

This is definitely a notable term/concept. We need to choose a few references. I have linked to this article from over 20 other IT-related articles. ~ Kvng ( talk) 17:15, 28 December 2015 (UTC) reply


Videos

Youtube | Vimeo | Bing

Websites

Google | Yahoo | Bing

Encyclopedia

Google | Yahoo | Bing

Facebook