Return to Article Details Training of information technology personnel through simulations for protection against cyber attacks Download Download PDF