News
In an interactive exercise based on a scenario at a fictional facility, participants identified which digital assets must be protected by analysing the functions of computer-supported systems and ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results