Return to Article Details Methods and means for effective data transfer control in secured computer networks Download Download PDF