Švedaitė, E. (2011). JRMAD method uses of information technology security. Mokslas – Lietuvos Ateitis / Science – Future of Lithuania, 3(1), 29-32. https://doi.org/10.3846/mla.2011.006