Computer security threat analysis for protecting data; Design and development of computer software in the field of information security, privacy and validity; design and development of computer software for establishing and maintaining document security for protecting data-privacy-validity for individuals and within organizations
Computer and Scientific