Return to Article Details Information security management based on intelligent technologies Download Download PDF