Abstract
A Study on the Application of Modularization Technique to Standard Security Policy to Protect Intelligence Assets and the Securement of Confidentiality and Integrity
Published Version
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have