CYpBER 2016 Conference Booklet Cyber Security | страница 38