« Layer 2 encryption network security vs thieves and burglars on clients data8. ITG Fachkonferenz / 8th ITG Symposium in Berlin »