22 results on '"ciberseguridad"'
Search Results
2. Cybersecurity, cyberspace and cyberthreats at the beginning of the 21st century: a Latin America typology and review.
- Author
-
Kosevich, Ekaterina
- Subjects
- *
CYBERTERRORISM , *CYBERSPACE , *INTERNET security , *INFORMATION & communication technologies , *TWENTY-first century , *INFORMATION technology - Abstract
Concepts of ‘cyberspace’, ‘cybersecurity’ and ‘cyberthreats’ and an analysis of policy documents are employed to explore the character and evolution of cybersecurity policies in Mexico, Colombia and the Dominican Republic, chosen as examples of ‘accelerated’, ‘transitional’ and ‘lagging’ Latin American development. Mexico focused on the stability of the Internet as a space that contributes to faster economic growth. Columbia’s ‘risk management’ path seeks a balance between plausible threat evaluation and the estimated cost of eliminating them and concentrates on the active prevention of cyberattacks, emphasising the importance of developing concrete mechanisms for international regulation in the field of cybersecurity. The approach to cybersecurity of the Dominican Republic is based on the idea of ensuring a rapid transition to an innovative development model with the widespread introduction of information and communication technology (ICT), while addressing domestic cybercrime to which ordinary citizens and businesses are constantly exposed to. Comparing these experiences, it is clear that these approaches are characterised by two trends: randomness and non-imitation. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
3. Cooperación internacional policial ante amenazas cibernéticas en Colombia: Modalidad Business Email Compromise.
- Author
-
Castillo Pulido, Luis Evelio and Jiménez Acosta, Juan Felipe
- Subjects
- *
DRUG traffic , *SEX crimes , *CYBERTERRORISM , *FRAUD , *INTERNATIONAL cooperation , *HUMAN trafficking , *CYBERBULLYING - Abstract
The objective of this research was to identify a model of international police cooperation applicable to the different manifestations of cyber threats in Colombia: theft by means of computer, through the Business Email Compromise (BEC) industry; its development has been achieved through an interpretive research model that provides an understanding of beliefs and attitudes that make it possible to comprehend the world from the perspective of academic experts; additionally, a mixed approach through which synergies are established and qualitative and quantitative methodologies are complemented; research methods that simultaneously allow for the triangulation of information obtained from field work and theoretical and descriptive/phenomenological studies; Key findings suggest that an international BEC pattern is linked to false invoices, real estate and CEO fraud, as well as domestic email compromises. the most affected actors are multilateral organisations, private and public companies, respectively; It has been linked to arms trafficking, human trafficking, sexual exploitation, drug trafficking, and organ trafficking. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
4. GOVERNANÇA DA SEGURANÇA CIBERNÉTICA E OS DESAFIOS DO SÉCULO XXI: A RELAÇÃO CIVIS-MILITARES NO SECTOR CIBERNÉTICO DO BRASIL.
- Author
-
Lopes da Silva Gomes, Nilton and Mendes Laginestra, Abian
- Subjects
INTERNET security ,CYBERTERRORISM ,CIVIL society ,SECONDARY analysis - Abstract
Copyright of Revista Foco (Interdisciplinary Studies Journal) is the property of Revista Foco and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2023
- Full Text
- View/download PDF
5. La importancia de la CIBERSEGURIDAD en la auditoría de cuentas: un enfoque legal y empresarial.
- Author
-
Omar del Reguero Carro, J.
- Subjects
CYBERTERRORISM ,INFORMATION technology security ,DATA protection ,INTERNET security ,AUDITING ,INTERNET security laws ,MODERN society ,AUDITORS ,BUSINESS enterprises - Abstract
Copyright of Técnica Contable y Financiera is the property of Wolters Kluwer Espana and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2023
6. La importancia de tener Instituciones Educativas ciberseguras post pandemia.
- Author
-
Gurumendi Párraga, David Julián
- Subjects
- *
COMPUTER crimes , *HOME offices , *MALWARE , *SAFETY , *DISTANCE education , *CYBERTERRORISM - Abstract
Cyber-attacks refer to computer crimes that have shown great growth as a result of the pandemic, in 2021. According to Kaspersky Latam portal, cyberattacks grew by 24% (Kaspersky, 2021), the reason is due to confinement. Companies had to opt for Home Office, as well as Educational Institutions, which began their Distance Learning activities, thus remaining unprotected and vulnerable to malware attacks, phishing among others. This scientific article proposes to describe the current situation of cybersecurity among Educational Institutions in Ecuador, as well as, the safety measures they must take to protect their information. [ABSTRACT FROM AUTHOR]
- Published
- 2023
7. La seguridad en el ciberespacio desde una perspectiva sociocultural.
- Author
-
Sánchez Vera, Fulgencio, Martínez Guirao, Javier Eloy, and Téllez Infantes, Anastasia
- Subjects
CYBERSPACE ,TRUST ,SOCIAL engineering (Fraud) ,WAR ,INTERNET security ,CYBERTERRORISM ,SOCIALIZATION - Abstract
Copyright of Methaodos: Social Science Journal / Methaodos: Revista de Ciencias Sociales is the property of Departamento de Ciencias de la Comunicacion y Sociologia, Universidad Rey Juan Carlos and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2022
- Full Text
- View/download PDF
8. La ciberseguridad en la era de hipercompetitividad: ¿puede la UE afrontar los nuevos retos?
- Author
-
Munkøe, Malthe and Mölder, Holger
- Subjects
- *
INTERNET security , *ELECTIONS , *STATE of the Union messages , *FAKE news , *FOREIGN electoral interference , *CORRUPT practices in elections , *CYBERTERRORISM , *STRATEGIC planning , *INFORMATION sharing , *COOPERATION - Abstract
In her 2021 State of the Union address, European Commission President Ursula von der Leyen stressed the need to improve EU cybersecurity. The threat landscape is diverse and changing, and includes disinformation and fake news, cyber-attacks on government infrastructure and interference in elections in third countries. With this in mind, in December 2020 the EU unveiled a new Cybersecurity Strategy that includes legislative and institutional initiatives: from the revision of the NIS Directive - the EU's first cybersecurity legislation - to the establishment of a cybershield to identify largescale cyber-attacks. To be effective in this field, which involves a multitude of actors, the EU will need to ensure robust cooperation and information exchange, both at national and European level, as well as with NATO. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
9. El papel de las tecnologías de la información en el proceso de Due Diligence.
- Author
-
CASTELLTORT, IVAN
- Subjects
INFORMATION technology ,DUE diligence ,CYBERTERRORISM ,HEALTH products ,CONTINUITY - Abstract
Copyright of Contabilidad y Dirección is the property of ACCID and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2022
10. Cyber security as the basis for the national security of Ukraine.
- Author
-
Tarasenko, Oleh, Mirkovets, Dmytro, Shevchyshen, Artem, Nahorniuk-Danyliuk, Oleksandr, and Yermakov, Yurii
- Subjects
INFORMATION & communication technologies ,INTERNET security ,INFRASTRUCTURE (Economics) ,DIALECTIC ,NATIONAL security ,CYBERTERRORISM - Abstract
Copyright of Cuestiones Políticas is the property of Revista Cuestiones Politicas and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2022
- Full Text
- View/download PDF
11. "EVALUACIÓN DEL RENDIMIENTO DE HONEYPOT EN REDES TELEMÁTICAS.".
- Author
-
Montiel, Giovanni Carlos Lorusso and Rios, Carlos E. UC
- Subjects
- *
DIGITAL technology , *CYBERTERRORISM , *SECURITY systems , *PERSONALLY identifiable information , *CLASSIFICATION - Abstract
In a globalized society, cybercrime has become a major problem, generating risks of essential information, such as passwords, personal data, among others. Not to mention, the vast sums of money that cyberattacks manage to fetch each year. This situation has taken on such a magnitude that conventional security measures are not enough to provide us with security in a digital environment. For this reason, the need arises to implement new computer protection tools, of which the "Honeypots" have stood out. The latter has become relevant, in addition to protecting, providing security; They are considered "trap" type systems that serve to observe the different behaviors of cyberattacks to later analyze the intrusion, the methods that were used. The general objective of this article is to study the active behavior of a Honeypot to later determine its performance, specify its degree of efficiency in the detection and classification of cyber-attack intruders. For this purpose, a technological methodology will be implemented, consisting of five (5) phases: diagnosis, plan design, resources, monitoring, and evaluation, as proposed by Arias (2016). A study will be carried out involving the use of a Honeypot with constant monitoring in three different types of situations that simulate a cyber-attack, at different degrees of intensity: without any attacks, attacks of less than 5 cycles per minute (light attacks), attacks greater at 10 cycles per minute (Heavy Attacks). The results obtained are highly acceptable; the honeypot obtained 95% efficiency in detecting simulated cyber-attacks with a performance of 95.4%. [ABSTRACT FROM AUTHOR]
- Published
- 2022
12. Norm Entrepreneurship in Global Cybersecurity.
- Subjects
- *
INTERNET governance , *CYBERTERRORISM , *INTERNET security , *NON-state actors (International relations) , *FILTERING software , *AUTHORITARIANISM , *CYBER intelligence (Computer security) - Abstract
New technologies create new challenges for global security that leave even the most militarily powerful countries vulnerable to attack. Countries are gearing up for electronic warfare and, in this realm, the old rules of international conflict either do not apply or have not been developed. Governments have yet to find stable policy solutions to match potential cyber threats. The challenge then is to establish new global norms concerning acceptable behavior in cyberspace. This article analyzes the attempts to construct global cybersecurity norms. It differs from much of the existing literature on norm‐construction since it moves beyond the interstate level to examine subnational groups and private sector actors that function as norm entrepreneurs in this policy area. The article posits that while nation states remain central, nonstate actors are playing an increasingly important role in cybersecurity norm‐building, supplementing state action, and, to some degree, compensating for state inaction when cooperation reaches an impasse. Related Articles: Glen, Carol M. 2014. "Internet Governance: Territorializing Cyberspace?" Politics & Policy 42 (5): 635‐657. https://doi.org/10.1111/polp.12093 Hellmeier, Sebastian. 2016. "The Dictator's Digital Toolkit: Explaining Variation in Internet Filtering in Authoritarian Regimes." Politics & Policy 44 (6): 1158‐1191. https://doi.org/10.1111/polp.12189 Zeng, Jinghan, Tim Stevens, and Yaru Chen. 2017. "China's Solution to Global Cyber Governance: Unpacking the Domestic Discourse of 'Internet Sovereignty.'" Politics & Policy 45 (3): 432‐464. https://doi.org/10.1111/polp.12202 [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
13. CARTOGRAFÍA CONCEPTUAL: HACIA LA CIBERSEGURIDAD PROACTIVA PARA LA EDUCACIÓN, OBLIGACIÓN DE TODOS.
- Author
-
Díaz Rodríguez, Elizabeth
- Subjects
GROUP problem solving ,DISTANCE education ,CYBERTERRORISM ,INTERNET security ,PROBLEM solving ,CYBER intelligence (Computer security) - Abstract
Copyright of HETS Online Journal is the property of Hispanic Educational Technology Services, Inc. (HETS) and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2021
- Full Text
- View/download PDF
14. Ciberseguridad del internet de las cosas robóticas: plataforma experimental.
- Author
-
Flores-Montaño, Luis-Alberto, Herrera-Lozada, Juan-Carlos, Sandoval-Gutiérrez, Jacobo, Vázquez-López, Rodrigo, and Martínez-Vázquez, Daniel-Librado
- Subjects
CYBERTERRORISM ,INTERNET of things ,DEFAULT (Finance) ,PERSONAL computers ,ROBOTS ,RASPBERRY Pi - Abstract
Copyright of DYNA - Ingeniería e Industria is the property of Publicaciones Dyna SL and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2021
- Full Text
- View/download PDF
15. The stability of State information in the face of terrorist threats.
- Author
-
Bidzilya, Yuriy M., Solomin, Yevhen O., Shapovalova, Halyna V., Georgiievska, Viktoriia V., and Poplavska, Nataliya M.
- Abstract
Copyright of Cuestiones Políticas is the property of Revista Cuestiones Politicas and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2021
- Full Text
- View/download PDF
16. Metodología a tres niveles para la integración segura y eficiente del vehículo eléctrico en la red eléctrica.
- Author
-
Calatayud-Martí, Pilar, Romero-Chavarro, Julián, Montagud-Aguar, Mario, Arcos-Usero, Lucía, García-Pellicer, Marta, and Quijano-López, Alfredo
- Subjects
ELECTRIC power consumption ,ELECTRIC vehicles ,RENEWABLE energy transition (Government policy) ,CYBERTERRORISM ,COMMUNICATION infrastructure ,ELECTRIC automobiles - Abstract
Copyright of DYNA - Ingeniería e Industria is the property of Publicaciones Dyna SL and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2021
- Full Text
- View/download PDF
17. PREVENCIÓN EN CIBERSEGURIDAD: ENFOCADA A LOS PROCESOS DE INFRAESTRUCTURA TECNOLÓGICA.
- Author
-
Rodrigo Cando-Segovia, Mauricio and Medina-Chicaiza, Patricio
- Subjects
SMALL business ,CYBERTERRORISM ,LITERATURE reviews ,INTERNET security ,BEST practices - Abstract
Copyright of 3C TIC is the property of Area de Innovacion y Desarrollo, SL and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2021
- Full Text
- View/download PDF
18. Ciberseguridad en las redes móviles de telecomunicaciones y su gestión de riesgos.
- Author
-
ROLDÁN ÁLVAREZ, MIGUEL ÁNGEL and VARGAS MONTOYA, HÉCTOR FERNANDO
- Subjects
- *
4G networks , *INTERNET service providers , *CYBERTERRORISM , *POSSIBILITY , *SECURITY management , *TELECOMMUNICATION systems - Abstract
The 3.5G and 4G network technologies are, currently, the most used in Colombia, given the great deployment that Internet service providers have made, which represents a security challenge with respect to the different attacks on these networks. The interception of data with "Man in the middle attacks" (MiTM) and denial of service - DoS (in the smartphone or in the mobile network) are very feasible. In this article of applied research aims to establish some risks and possible impacts associated with telecommunications networks and how an attacker with little computational resource can eventually compromise the system, some risk and security vulnerabilities in mobile networks and their possibility of exploitation, as well as the general recommendations for risk reduction are studied. To achieve the above, an investigation of different vulnerabilities in these telecommunications networks was carried out, a risk map, in order to visualize the possible impacts, was made. Then, a technical test was run to capture traffic during the MiTM attack (which was successful), and as a final result, deliver recommendations in the event that they can execute cyber-attacks, with this, to be able to have a basis for the assurance of telecommunications networks and systems, allowing different people to recognize the vulnerabilities little explored in this type of systems. [ABSTRACT FROM AUTHOR]
- Published
- 2020
19. Ciberseguridad y ciberdefensa en Colombia: un posible modelo a seguir en las relaciones cívico-militares.
- Author
-
Cujabante Villamil, Ximena Andrea, Bahamón Jara, Martha Lucía, Prieto Venegas, Jair Camilo, and Quiroga Aguilar, Jorge Alejandro
- Subjects
- *
CIVIL-military relations , *NATIONAL security , *DATA security , *INTERNET security , *SECONDARY analysis , *CYBERNETICS , *CYBERTERRORISM - Abstract
This article explores the institutional development of the cyberspace domain in Colombia and its impact on civil-military relations in the country. An analysis of primary and secondary sources is used to define cyberspace and identify the cyber threats within it. It also describes civil-military relations in Colombia and the institutional framework of national cyberspace security and defense. Contrary to convention, in this case, it is evident that the initiative emerged from the country's civil sector, promoting greater participation of this segment in the field of security and defense. Thus, the cybersecurity and cyber defense agenda can be used to spearhead the rethinking of civil-military relations. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
20. Desafío de la ciberseguridad ante la legislación penal.
- Author
-
Carrera Calderón, Frankz Alberto, Quilligana Barraquel, Joel Estuardo, Aguilar Martínez, Mario Danilo, and Fiallos Bonilla, Santiago Fernando
- Subjects
COMPUTER systems ,CYBERTERRORISM ,POLITICAL asylum ,COMPUTER crimes ,INTERNET security ,DENIAL of service attacks - Abstract
Copyright of Dilemas Contemporáneos: Educación, Política y Valores is the property of Dilemas Contemporaneos: Educacion, Politica y Valores and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2019
21. United States in the management of technological evolution as a terrorist action factor: islamic state case
- Author
-
Malagón Puerto, David Augusto, Herrera Celis, Lizeth Mallerly, and Ghotme Ghotme, Rafat Ahmed
- Subjects
Ciberterrorismo ,Poder ,Cybersecurity ,International Security ,Cyberterrorism ,Globalización tecnológica ,Espionaje ,Ciberseguridad ,Espionage ,TERRORISMO ,Power ,Seguridad Internacional ,INNOVACIONES TECNOLOGICAS ,Technological globalization - Abstract
En el proyecto de investigación a desarrollar se connota una de las realidades a las cuales el denominado sistema internacional está sujeto desde muchos años atrás y que conlleva a una de las grandes preocupaciones en la actualidad, el terrorismo, pues como bien se conoce es un método por el cual se infunde miedo ya sea a la población civil o a grupos armados pertenecientes al Estado como los ejércitos y la fuerza pública, lo que en los últimos años el modus operandi de estos se ha venido transformado gracias a las nuevas herramientas que la globalización ha generado al entorno, como la tecnología y los medios de comunicación, siendo estos canales facilitadores para la propagación de un método de terror que amenaza la tranquilidad del mundo y que evidencia nuevos panoramas que quizás la sociedad internacional no se encuentra preparada para combatir. De acuerdo a lo dicho anteriormente, el hecho sustancial de este proyecto es lograr identificar de manera concisa cómo Estados Unidos ha respondido al accionar terrorista, específicamente del grupo Estado Islámico divulgado a través de los diferentes medios de comunicación y redes sociales, que generan escenarios de ciberguerra en una escala mundial donde las medidas implementadas por este gobierno afectan de manera directa la seguridad del Estado y la relevancia y evolución del grupo terrorista a nivel global. INTRODUCCIÓN 1 Pregunta de Investigación 4 Hipótesis 4 Objetivos 4 Justificación 5 Metodología 6 MARCO REFERENCIAL Estado del arte 7 Marco teórico 8 Marco conceptual 11 CAPÍTULO I: ESTADO ISLÁMICO, UN ACTOR ERRADICANDO JERARQUÍAS 13 1.1 Ciberterrorismo la estrategia dominante del último siglo 15 1.2 Estados Unidos blanco del ciberterrorismo del Estado islámico 18 1.3 Manifestaciones estratégicas de ciberterrorismo 20 1.4 Manejo tecnológico de los actores en conflicto 23 1.5 Medios de comunicación: destino ciberterrorista 24 1.6 Redes sociales: herramientas de ciberguerra 26 1.7 Estado Islámico y sus nuevas formas de operar 28 CAPÍTULO II: TRANSICIÓN DE LA POLÍTICA ANTITERRORISTA DE LOS ESTADOS UNIDOS Y SU RELEVANCIA EN EL ÁMBITO TECNOLÓGICO 33 2.1 Caracterización de la política antiterrorista 35 2.2Administración Clinton: El error de la transición 37 2.3 Administración Bush: La época del cambio y el terror 40 2.4 Administración Obama: A la luz de la prevención 44 CAPÍTULO III ESPIONAJE COMO ESTRATEGIA DE INTELIGENCIA: CASO EDWARD SNOWDEN 48 3.1 Operación Snowden: prueba de confidencialidad 50 3.2 Verizon y AT& T: El centro del espionaje 52 3.3 Actores en conflicto: el impacto de las declaraciones 54 3.4 Espionaje como política antiterrorista 55 3.5 Los medios de comunicación y el papel de las revelaciones 56 CONCLUSIONES 58 BIBLIOGRAFIA 60 ANEXOS 65 In the research project to be developed, one of the realities to which the so-called international system is subject from many years ago is connoted and that leads to one of the greatest concerns at present, terrorism, because as is well known it is a method by which fear is infused either to the civilian population or to armed groups belonging to the State such as the armies and the public force, which in recent years the modus operandi of these has been transformed thanks to the new tools that globalization has generated to the environment, such as technology and the media, these channels being facilitators for the propagation of a method of terror that threatens the tranquility of the world and that reveals new scenarios that perhaps the international society is not prepared to fight. Pregrado Dans le projet de recherche à développer, l'une des réalités auxquelles le système international est soumis il y a de nombreuses années est connotée, ce qui mène à l'une des plus grandes préoccupations à l'heure actuelle, le terrorisme, car il est bien connu par laquelle la peur est transmise soit à la population civile, soit à des groupes armés appartenant à l'Etat tels que les armées et la force publique, dont le mode de fonctionnement a été transformé ces dernières années grâce aux nouveaux outils que la mondialisation a générés à l'environnement, tels que la technologie et les médias, ces canaux étant des facilitateurs pour la propagation d'une méthode de terreur qui menace la tranquillité du monde et qui révèle de nouveaux scénarios que la société internationale n'est peut-être pas prête à combattre.
- Published
- 2018
22. CIBERSEGURIDAD Y DERECHO INTERNACIONAL
- Author
-
Segura Serrano, Antonio
- Published
- 2017
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.