Return to Issue Details DETECTION OF INFORMATION SYSTEM VULNERABILITIES BASED ON IDENTIFICATION AND AUTHENTICATION PROCEDURES Download Download PDF