Return to Issue Details Development and Exploitation of Databases Application in Respect of Information Security Requirements Download Download PDF