[1]
Švedaitė, E. 2011. JRMAD method uses of information technology security.
Mokslas – Lietuvos ateitis / Science – Future of Lithuania
. 3, 1 (Aug. 2011), 29-32. DOI:https://doi.org/10.3846/mla.2011.006.