KELIIAA, CURTIS M. - 2008
interactive cyber-policy implementation. Cyber-policy implementation includes security, network management, operational process …, manage security and provision critical network services permitting a proactive defense-in-depth cyber-security posture … and quality of service policies. The leading network-technology vendors have invested in these technologies for secure …