[1]
Švedaitė, E. 2011. JRMAD method uses of information technology security. Mokslas – Lietuvos ateitis / Science – Future of Lithuania. 3, 1 (Aug. 2011), 29-32. DOI:https://doi.org/10.3846/mla.2011.006.