Capacity assurance in hostile networks

Full text