понедельник, 15 апреля 2019 г.

Do you consider information asset owner's behavior and goals as primary security strategy driver? Who are they? Are they corporate leaders, or they're just custodians whether real asset owners are customers, state entities and counter parties?


from Twitter https://twitter.com/obodryk

Комментариев нет:

Отправить комментарий