Return to Article Details Information technologies for database protection against cyber attacks in military information systems Download Download PDF