Return to Article Details Peculiarities of forming a cybersecurity management system for enterprises in wartime: theoretical and applied aspect Download Download PDF