Security issues
Two methods:
Physical protection of digital objects
Legal protection of digital objects
Previous slide
Next slide
Back to first slide
View graphic version