Vol-3825⫷ Vol-3826 ⫸Vol-3827
urn:nbn:de:0074-3826-0


Vol-3826/paper1⫷Vol-3826/paper2⫸Vol-3826/paper3

Testing an organization’s information system for unauthorized access