First Page | Document Content | |
---|---|---|
![]() Date: 2014-12-09 18:46:52Election fraud Cyberwarfare Computer network security Information society Software testing Voter-verified paper audit trail Vulnerability Voting machine Security through obscurity Electronic voting Politics Computer security | Add to Reading List |