First Page | Document Content | |
---|---|---|
Date: 2011-05-14 16:39:28Election fraud Cyberwarfare Computer network security Information society Software testing Voter-verified paper audit trail Vulnerability Voting machine Security through obscurity Electronic voting Politics Computer security | Microsoft Word - Red_Overview-after2.docDocument is deleted from original location. Download Document from Web Archive |