[1]
Anpilohov, S. and Voloshyn, A. 2012. Features of using tablet computers Apple IPad 2 to protect confidential information in distributed information and telecommunication systems. Information Technology and Security. 1, 1 (Jun. 2012), 123–132. DOI:https://doi.org/10.20535/2411-1031.2012.1.1.54097.