Return to Article Details
DETECTION OF INFORMATION SECURITY VIOLATIONS IN DATA FLOWS IN THE ELECTRONIC GOVERNMENT SYSTEM
Download
Download PDF