A comparative study of the evolution of vulnerabilities in IT systems and its relation to the new concept of cloud computing

LAUR Repository

Files in this item

Files Size Format View

There are no files associated with this item.

This item appears in the following Collection(s)

Search LAUR

Advanced Search


My Account