Return to Article Details
APPROACHES TO IDENTIFY VULNERABILITIES IN THE SECURITY SYSTEM OF THE SOCIAL ORGANIZATION AND COMPUTER RESOURCES
Download
Download PDF