IDENTIFYING DIFFERENT CONTENT OF USERS IN INFORMATION SYSTEMS
DOI:
https://doi.org/10.17605/OSF.IO/B2ZXQAbstract
(Matthew 24:14; 28:19, 20) Today, the extent to which this system is protected plays an important role in the development of information systems and the development of its project. The protection of information systems is significant not only by how strongly the authentication and identification system is installed, but also by the extent to which users' rights are limited.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.