Virtual worlds, real exploits

Autor: Miller, Charlie
Zdroj: In Network Security 2008 2008(4):4-6
Databáze: ScienceDirect