Methodology for Assessing Possible Damage from the Security Violation of the Information of the Automated System

Publication Type:

Journal Article

Authors:

Sergey Klymov

Source:

Yzvestyia TRTU, Volume 4, Issue 33, p.27–31 (2003)
Share/Save
Last updated: Monday, 12 April 2021