Title of article
This article provides one large corporateʹs view on the use of cryptographic methods to protect the corporate network.
Author/Authors
John Walker، نويسنده , , Information Security Policy Group، نويسنده ,
Issue Information
روزنامه با شماره پیاپی سال 1997
Pages
7
From page
21
To page
27
Journal title
Information Security Technical Report
Serial Year
1997
Journal title
Information Security Technical Report
Record number
177491
Link To Document