Return to Article Details Information Security in Computing Systems, Objects and Methods of Measuring Protection Parameters Download Download PDF