81
82
85
86
88
95
Descripción:
“... to being attacked. People who manage these devices present a high risk of vulnerability for violation...”
96
97
99
100
Autores Sandoval Forero, Eduardo Andrés, Román Reyes, Rosa Patricia, González Becerril, Juan Gabino
Publicado 2015-01-01
Publicado 2015-01-01