1.
Švedaitė E. JRMAD method uses of information technology security. MLA [Internet]. 2011 Aug. 22 [cited 2025 May 9];3(1):29-32. Available from: https://journals.vilniustech.lt/index.php/MLA/article/view/4989