The Method of Calculation of Probability of Realization of Threats of Information With the Limited Access From an Internal User Violator

Information systems and technologies security
doi 10.17721/ists.2019.1.19-26
Full Text
Abstract

Available in full text

Date
Authors
Publisher

Taras Shevchenko National University of Kyiv


Related search