Implementation and evaluation of the network level security architecture
2005
Keywords:
- Network security policy
- Sherwood Applied Business Security Architecture
- Open network architecture
- Computer architecture
- Applications architecture
- Distributed System Security Architecture
- Business
- Computer network
- Security information and event management
- Space-based architecture
- Security service
- Solution architecture
- Enterprise information security architecture
- Network Access Control
- Computer science
- Correction
- Source
- Cite
- Save
- Machine Reading By IdeaReader
0
References
5
Citations
NaN
KQI