(1)
Švedaitė, E. JRMAD Method Uses of Information Technology Security. MLA 2011, 3 (1), 29-32. https://doi.org/10.3846/mla.2011.006.