Return to Article Details THE NEED TO IMPLEMENT CRYPTOGRAPHIC INFORMATION PROTECTION TOOLS IN THE OPERATING SYSTEM AND EXISTING SOLUTIONS Download Download PDF