(1)
Švedaitė, E. JRMAD Method Uses of Information Technology Security. MLA 2011, 3, 29-32.