Return to Article Details
Features of using tablet computers Apple IPad 2 to protect confidential information in distributed information and telecommunication systems
Download
Download PDF