<--- Back to Details
First PageDocument Content
Election fraud / Cyberwarfare / Computer network security / Information society / Software testing / Voter-verified paper audit trail / Vulnerability / Voting machine / Security through obscurity / Electronic voting / Politics / Computer security
Date: 2011-05-14 16:39:28
Election fraud
Cyberwarfare
Computer network security
Information society
Software testing
Voter-verified paper audit trail
Vulnerability
Voting machine
Security through obscurity
Electronic voting
Politics
Computer security

Microsoft Word - Red_Overview-after2.doc

Document is deleted from original location.
Use the Download Button below to download from the Web Archive.

Download Document from Web Archive

File Size: 303,08 KB