Return to Article Details Topological Aspects in References to Network Security