Title of article :
This article provides one large corporateʹs view on the use of cryptographic methods to protect the corporate network.
Author/Authors :
John Walker، نويسنده , , Information Security Policy Group، نويسنده ,
Issue Information :
روزنامه با شماره پیاپی سال 1997
Pages :
7
From page :
21
To page :
27
Journal title :
Information Security Technical Report
Serial Year :
1997
Journal title :
Information Security Technical Report
Record number :
177491
Link To Document :
بازگشت