Return to Article Details METHODS OF LIMITING AUTHORIZED ACCESS AND EXIT OF INFORMATION IN COMPUTER NETWORKS Download Download PDF