Return to Article Details An analysis of network security and protection strategies in hospital informatization Download Download PDF