[1]
S. Anpilohov and A. Voloshyn, “Features of using tablet computers Apple IPad 2 to protect confidential information in distributed information and telecommunication systems”, ITS, vol. 1, no. 1, pp. 123–132, Jun. 2012.