BYOD Security challenges: control and protect your most sensitive data Вид публикации: Journal Article Авторы: Bill Morrow Источник: Network Security, Volume 12, p.5-8 (2012)