First Page | Document Content | |
---|---|---|
![]() Date: 2011-05-14 16:39:28Election fraud Cyberwarfare Computer network security Information society Software testing Voter-verified paper audit trail Vulnerability Voting machine Security through obscurity Electronic voting Politics Computer security |
|