Skip to main content
. 2018 Sep 9:345–404. doi: 10.1007/978-3-319-95669-5_10

Fig. 10.7.

Fig. 10.7

Typical elements of a boundary security system, forming the perimeter security layer of a DiD implementation