[1]
E. Švedaitė, “JRMAD method uses of information technology security”, MLA, vol. 3, no. 1, pp. 29-32, Aug. 2011.