''Top-down'' versus ''Bottom-up'' - Different approaches to security

Author: Wilson P.  

Publisher: Elsevier

ISSN: 1353-4858

Source: Network Security, Vol.2003, Iss.12, 2003-12, pp. : 17-19

Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.

Previous Menu Next

Abstract