Return to Article Details Features of using tablet computers Apple IPad 2 to protect confidential information in distributed information and telecommunication systems Download Download PDF