Return to Issue Details THE METHODS OF DETECTION UNAUTHORIZED COMPUTER PROCESSES OF INFORMATION AND TELECOMMUNICATION SYSTEMS Download Download PDF