Wednesday, February 1, 2012 - 08:01
Geoff Constable, Hefin James and Ian Jones,
University of Wales, Aberystwyth
Contents
Summary
Introduction
Background
Service Requirements and Constraints
Security Considerations and Solution
Project Planning
Equipment Test, Evaluation, Comparison and Selection
Procurement