Articoli di riviste sul tema "Information security"

Segui questo link per vedere altri tipi di pubblicazioni sul tema: Information security.

Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili

Scegli il tipo di fonte:

Vedi i top-50 articoli di riviste per l'attività di ricerca sul tema "Information security".

Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.

Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.

Vedi gli articoli di riviste di molte aree scientifiche e compila una bibliografia corretta.

1

Shumilina, Vera, e Alexander Kim. "MODERN INFORMATION SECURITY AND INFORMATION SECURITY". Science & World 2022, n. 3 (30 agosto 2022): 96–100. http://dx.doi.org/10.26526/2307-9401-2022-3-96-100.

Testo completo
Abstract (sommario):
This article examines the concept of information security, how it is implemented and enforced. It analyses the essence of information, what it is for, what processes are studied with its help. The basic criteria of information security, which guarantee reliable protection for information, are given, and popular and malicious software, which destabilize and destroy the work of the information system, are discussed
Gli stili APA, Harvard, Vancouver, ISO e altri
2

Imai, Hideki. "Information security. 1. Information security and cryptography." Journal of the Institute of Television Engineers of Japan 42, n. 12 (1988): 1285–90. http://dx.doi.org/10.3169/itej1978.42.1285.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
3

Namba, Seiichi. "Information security. 2. Information security in broadcasting." Journal of the Institute of Television Engineers of Japan 42, n. 12 (1988): 1291–98. http://dx.doi.org/10.3169/itej1978.42.1291.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Koyama, Kenji. "Information security. 3. Information security for communications." Journal of the Institute of Television Engineers of Japan 42, n. 12 (1988): 1299–306. http://dx.doi.org/10.3169/itej1978.42.1299.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
5

Matsumoto, Tsutomu. "Information security. 4. Information security in network." Journal of the Institute of Television Engineers of Japan 42, n. 12 (1988): 1307–13. http://dx.doi.org/10.3169/itej1978.42.1307.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
6

Humaidi, Norshima, e Vimala Balakrishnan. "Leadership Styles and Information Security Compliance Behavior: The Mediator Effect of Information Security Awareness". International Journal of Information and Education Technology 5, n. 4 (2015): 311–18. http://dx.doi.org/10.7763/ijiet.2015.v5.522.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
7

Adambaevich, Khabibullaev Hikmat. "ISSUES OF ENSURING INFORMATION SECURITY IN INFORMATION FACILITIES". European International Journal of Multidisciplinary Research and Management Studies 02, n. 10 (11 ottobre 2022): 281–83. http://dx.doi.org/10.55640/eijmrms-02-10-52.

Testo completo
Abstract (sommario):
In the process of globalization, that is, in today's information age, the issue of ensuring information security is gaining priority. Today, the issue of ensuring information security is becoming very important and urgent not only in the Internet network or any information system, but also in information facilities. In this article, the issues of ensuring information security in information facilities are considered on the example of safe storage of rare books in information-library institutions, and relevant suggestions and recommendations are developed.
Gli stili APA, Harvard, Vancouver, ISO e altri
8

Erceg, Aleksandar. "Information security". Tehnički glasnik 13, n. 2 (17 giugno 2019): 123–28. http://dx.doi.org/10.31803/tg-20180717222848.

Testo completo
Abstract (sommario):
Information security inside the organization is becoming a major issue in the modern and global world. Information accessibility and security are a major issue where user behaviour plays an important role. Information security user behaviour is becoming an increasing threat to their organization information security. Since the organization is investing in and implementing information security systems, the issue of employees’ behaviour has become increasingly important. This paper aims to show how workers treat information security and is looking upon so called “people problem”. In the research, the personal behaviour of health care professionals and workers in a Croatian production company in relation to information security was tested. Results have shown that the overall behaviour of respondents in production company is more responsible and security awareness with proper use of passwords is associated with knowledge about the importance of security application in their work. Further research is recommended.
Gli stili APA, Harvard, Vancouver, ISO e altri
9

Kaushik, Saurav. "Information Security". International Journal for Research in Applied Science and Engineering Technology 8, n. 5 (31 maggio 2020): 2779–83. http://dx.doi.org/10.22214/ijraset.2020.5468.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
10

Yamamoto, Akitomo. "Information Security". IEEJ Transactions on Electronics, Information and Systems 107, n. 9 (1987): 804–9. http://dx.doi.org/10.1541/ieejeiss1987.107.9_804.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
11

Jesan, John Peter. "Information security". Ubiquity 2006, January (gennaio 2006): 2. http://dx.doi.org/10.1145/1119621.1117695.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
12

Silic, Mario, e Andrea Back. "Information security". Information Management & Computer Security 22, n. 3 (8 luglio 2014): 279–308. http://dx.doi.org/10.1108/imcs-05-2013-0041.

Testo completo
Abstract (sommario):
Purpose – The purpose of this literature review is to analyze current trends in information security and suggest future directions for research. Design/methodology/approach – The authors used literature review to analyze 1,588 papers from 23 journals and 5 conferences. Findings – The authors identified 164 different theories used in 684 publications. Distribution of research methods showed that the subjective-argumentative category accounted for 81 per cent, whereas other methods got very low focus. This research offers implications for future research directions on information security. They also identified existing knowledge gaps and how the existing themes are studied in academia. Research limitations/implications – The literature review did not include some dedicated security journals (i.e. Cryptography). Practical implications – The study reveals future directions and trend that the academia should consider. Originality/value – Information security is top concern for organizations, and this research analyzed how academia dealt with the topic since 1977. Also, the authors suggest future directions for research suggesting new research streams.
Gli stili APA, Harvard, Vancouver, ISO e altri
13

Laybats, Claire, e Luke Tredinnick. "Information security". Business Information Review 33, n. 2 (giugno 2016): 76–80. http://dx.doi.org/10.1177/0266382116653061.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
14

Yang, Xia. "A Novel Information Security Model for Securing Information Systems". Applied Mechanics and Materials 685 (ottobre 2014): 493–96. http://dx.doi.org/10.4028/www.scientific.net/amm.685.493.

Testo completo
Abstract (sommario):
Securing information system in current information era is very important task. This paper presents a novel security model in order to secure sensitive information systems. This model combines protection, detection, recovery and control mechanisms to secure information system in their development lifecycle, which is more effective than the traditional ones.
Gli stili APA, Harvard, Vancouver, ISO e altri
15

Sharma, Suman, Yogesh Verma e Amit Nadda. "Information Security Cyber Security Challenges". International Journal of Scientific Research in Computer Science and Engineering 7, n. 1 (28 febbraio 2019): 10–15. http://dx.doi.org/10.26438/ijsrcse/v7i1.1015.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
16

Dunkerley, Kimberley, e Gurvirender Tejay. "Theorizing Information Security Success". International Journal of Electronic Government Research 6, n. 3 (luglio 2010): 31–41. http://dx.doi.org/10.4018/jegr.2010070103.

Testo completo
Abstract (sommario):
As information systems become more pervasive within organizations, securing their associated information assets has become a topic of extensive research. However, minimal research has been focused on understanding the dimensions of information systems security within an organizational context. This study organizes a considerable body of information systems security literature based on their findings, and the authors identify core dimensions of information system security success and operationalize them as a model to predict success with information security initiatives. The utility of the proposed model is evaluated for the e-Government context and emergent issues for research and practice are discussed.
Gli stili APA, Harvard, Vancouver, ISO e altri
17

Wendzel, Steffen, Luca Caviglione, Alessandro Checco, Aleksandra Mileva, Jean-Francois Lalande e Wojciech Mazurczyk. "Information Security Methodology, Replication Studies and Information Security Education". JUCS - Journal of Universal Computer Science 26, n. 7 (28 luglio 2020): 762–63. http://dx.doi.org/10.3897/jucs.2020.041.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
18

Singh, Lisha, Sahil Sharma e Sneh Rathore. "Secure101: Automatic Surveillance and Information Security". International Journal of Trend in Scientific Research and Development Volume-2, Issue-3 (30 aprile 2018): 1527–32. http://dx.doi.org/10.31142/ijtsrd11298.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
19

Domozetov, Christo. "Information Security: Management and Personnel Issues". Information & Security: An International Journal 1, n. 1 (1998): 46–60. http://dx.doi.org/10.11610/isij.0104.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
20

Kavaljiev, Todor. "Information in providing security and prosperity". Information & Security: An International Journal 1, n. 2 (1998): 11–13. http://dx.doi.org/10.11610/isij.0112.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
21

Tagarev, Peter. "National Security Concepts and Information Warfare". Information & Security: An International Journal 1, n. 2 (1998): 33–42. http://dx.doi.org/10.11610/isij.0114.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
22

Samijonov, Nurmukhammad Y. "AI FOR INFORMATION SECURITY AND CYBERSPACE". American Journal of Applied Science and Technology 3, n. 10 (1 ottobre 2023): 39–43. http://dx.doi.org/10.37547/ajast/volume03issue10-08.

Testo completo
Abstract (sommario):
Taking into account the fact that artificial intelligence can expand the capabilities of humanity, accelerate the speed of data analysis several times, and help people reach correct and accurate conclusions in the decision-making process, it can improve data security or, on the contrary, target propaganda and fake news. Collecting information, taking very little responsibility, and taking into account the fact that social networks can expand the speed and extent of dissemination of information simultaneously in two opposite directions, AI can both strengthen cyber security or create new types of threats to it.
Gli stili APA, Harvard, Vancouver, ISO e altri
23

Lestari, Dwi Puji. "Factors Affecting Security Information Systems : Information Security, Threats and Cyber Attack, Physical Security, and Information Technology". IJIIS: International Journal of Informatics and Information Systems 7, n. 1 (7 gennaio 2024): 16–21. http://dx.doi.org/10.47738/ijiis.v7i1.193.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
24

Morita, Hikaru, e Shoji Miyaguchi. "Special Edition. Recent Information Security. Essential Security Technologies. Recent Trends of Information Security." Journal of the Institute of Television Engineers of Japan 47, n. 2 (1993): 138–40. http://dx.doi.org/10.3169/itej1978.47.138.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
25

Bondar, H. L., e L. O. Rakutina. "Information policy and information security". Public administration and customs administration 4 (2019): 42–49. http://dx.doi.org/10.32836/2310-9653-2019-4-42-49.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
26

LIDERMAN, Krzysztof, e Andrzej MALIK. "INFORMATION POLICY AND INFORMATION SECURITY". National Security Studies 4, n. 1 (1 dicembre 2013): 399–411. http://dx.doi.org/10.37055/sbn/129814.

Testo completo
Abstract (sommario):
W artykule została przedstawiona problematyka polityki informacyjnej, przede wszystkim w odniesieniu do polityki informacyjnej resortu Obrony Narodowej, ograniczonej specyficznie do treści zamieszczanych w Internecie. Wskazano na możliwości osiągania różnych celów propagandowych poprzez umiejętne manipulowanie atrybutami informacji (rozdz. 2 i 3) oraz na możliwości wykorzystania Internetu w zakresie kształtowania świadomości jego użytkowników (rozdz. 4).
Gli stili APA, Harvard, Vancouver, ISO e altri
27

Hojda, Mihaela Hortensia. "Information security economics: cyber security threats". Proceedings of the International Conference on Business Excellence 16, n. 1 (1 agosto 2022): 584–92. http://dx.doi.org/10.2478/picbe-2022-0056.

Testo completo
Abstract (sommario):
Abstract This article takes into consideration cyber security economics to understand whether cyber security and economics is a partnership among equals or any of these two disciplines have the upper hand. Cyber security economics is more than just computer science, security studies and economics in a holistic way, it is a dynamic cross disciplinary matter involving psychology, forensic, sociology, etc. The argument is that there is no clear definition of cybersecurity, apart from a set of protocols that are highly technical, and when it comes to cyber security economics Gordon-Loeb model provides a good picture on the general image over the industry, yet, much more is ignored, as the costs of a cyber security attack to succeed is huge, save the hidden costs and other externalities. Apart from regulation establishing a common ground, information security economics is an under researched field of interest, especially as digital sovereignty act is about to be voted for, together with common rules Information security.
Gli stili APA, Harvard, Vancouver, ISO e altri
28

Kuka, Elda, e Rovena Bahiti. "Information Security Management: Password Security Issues". Academic Journal of Interdisciplinary Studies 7, n. 2 (1 luglio 2018): 43–47. http://dx.doi.org/10.2478/ajis-2018-0045.

Testo completo
Abstract (sommario):
Abstract As users of technology in our everyday actions we need to authenticate in different applications, in fast and secure mode. Although passwords are called the least secure mode of authentication, it’s the simplicity of entering a textual password for just a few seconds, especially when a fast transaction is needed, the main advantage that textual password based authentication method has against other authentication methods. We have prepared a questionnaire that will help us to identify the practices, characteristics, and problems of creation and usage of passwords in online applications, services and social networks. The target population is a group of users who have knowledge on information technology in public administration.
Gli stili APA, Harvard, Vancouver, ISO e altri
29

Johnston, Allen C., e Ron Hale. "Improved security through information security governance". Communications of the ACM 52, n. 1 (gennaio 2009): 126–29. http://dx.doi.org/10.1145/1435417.1435446.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
30

von Solms, Basie, e Rossouw von Solms. "From information security to…business security?" Computers & Security 24, n. 4 (giugno 2005): 271–73. http://dx.doi.org/10.1016/j.cose.2005.04.004.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
31

von Solms, Rossouw, e Johan van Niekerk. "From information security to cyber security". Computers & Security 38 (ottobre 2013): 97–102. http://dx.doi.org/10.1016/j.cose.2013.04.004.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
32

Martins, José, Henrique dos Santos, António Rosinha e Agostinho Valente. "Information Security Management". International Journal of Cyber Warfare and Terrorism 3, n. 3 (luglio 2013): 32–48. http://dx.doi.org/10.4018/ijcwt.2013070103.

Testo completo
Abstract (sommario):
The authors present a Case Study conducted in a Portuguese military organization, to answer the following research questions: (1) what are the most relevant dimensions and categories of information security controls applied in military organizations? (2) What are the main scenarios of information security incidents that are expected to occur? (3) What is the decision process used for planning and selection information security controls? This study reveals that: (1) information security within the military organization is built on the basis of physical and human attack vectors, and targeting the infrastructure that supports the flow of information in the organization; (2) the information security controls applied in the military organization are included in ISO/IEC 27001; (3) planning and selection of applied information security controls are made by decision makers and information security specialists. It appears that specialists impose their planning options essentially seeking to select and retrieve past successful information security cases.
Gli stili APA, Harvard, Vancouver, ISO e altri
33

Lim, Joo S., Sean B. Maynard, Atif Ahmad e Shanton Chang. "Information Security Culture". International Journal of Cyber Warfare and Terrorism 5, n. 2 (aprile 2015): 31–52. http://dx.doi.org/10.4018/ijcwt.2015040103.

Testo completo
Abstract (sommario):
There is considerable literature in the area of information security management (ISM). However, from an organizational viewpoint, the collective body of literature does not present a coherent, unified view of recommended security management practices. In particular, despite the existence of ‘best-practice' standards on information security management, organizations have no way of evaluating the reliability or objectivity of the recommended practices as they do not provide any underlying reasoning or justification. This paper is a first step towards the development of rigorous and formal instruments of measurement by which organizations can assess their security management practices. The paper identifies nine security practice constructs from the literature and develops measurement items for organizations to assess the adequacy of their security management practices. The study uses a multiple case study approach followed by interviews with a panel of four security experts to validate and refine these security practice constructs and their associated measures.
Gli stili APA, Harvard, Vancouver, ISO e altri
34

Somepalli, Sri Harsha, Sai Kishore Reddy Tangella e Santosh Yalamanchili. "Information Security Management". HOLISTICA – Journal of Business and Public Administration 11, n. 2 (1 agosto 2020): 1–16. http://dx.doi.org/10.2478/hjbpa-2020-0015.

Testo completo
Abstract (sommario):
AbstractInformation security management is a very important issue for anyone working in the field of technology, or for anyone at risk of security breach, who understands the implications of these vulnerabilities. Many organizations are always on the constant threat of a security breach. It is easy for an organization to experience a data breach that can seriously compromise their data. With the evolving threats of data security, organizations are always working to ensure that their data is protected. Frameworks associated with information security can be pivotal to an organization. Frameworks employed in organizations helps to protect the employee and user information which is essential as it puts employees and clients at ease that their information is secure. Identifying the ideal frameworks for an organization is important. However, this process can be a bit tricky as a lot has to be considered to identify the best framework for the organization.
Gli stili APA, Harvard, Vancouver, ISO e altri
35

Liang, Yingbin, H. Vincent Poor e Shlomo Shamai (Shitz). "Information Theoretic Security". Foundations and Trends® in Communications and Information Theory 5, n. 4–5 (2007): 355–580. http://dx.doi.org/10.1561/0100000036.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
36

Boychenko, O. V., e D. V. Ivanyuta. "INFORMATION SECURITY MODELS". Construction economic and environmental management 80, n. 3 (2022): 33–39. http://dx.doi.org/10.37279/2519-4453-2021-3-33-39.

Testo completo
Abstract (sommario):
This article considers the problem of ensuring information security in modern conditions. The analysis of a possible solution to this problem is carried out by constructing information security models: conceptual, mathematical and functional. Taking into account the improvement of strategic information security management and new technologies in the computer sphere, an attempt is made to consider in detail the conceptual model of information security, the importance and necessity of which is associated with an increase in the volume of transmitted, used and stored data, as well as the implementation in practice of protecting the information rights of users using the proposed mechanisms.
Gli stili APA, Harvard, Vancouver, ISO e altri
37

Wu, Yu ’Andy’, e Carol Stoak Saunders. "Governing Information Security". Information Resources Management Journal 24, n. 1 (gennaio 2011): 28–45. http://dx.doi.org/10.4018/irmj.2011010103.

Testo completo
Abstract (sommario):
Governance of the information security function is critical to effective security. In this paper, the authors present a conceptual model for security governance from the perspective of decision rights allocation. Based on Da Veiga and Eloff’s (2007) framework for security governance and two high-level information security documents published by the National Institute of Standards and Technology (NIST), the authors present seven domains of information security governance. For each of the governance domains, they propose a main decision type, using the taxonomy of information technology decisions defined by Weill and Ross (2004). This framework recommends the selection of decision rights allocation patterns that are proper to those decision types to ensure good security decisions. As a result, a balance can be achieved between decisional authority and responsibility for information security.
Gli stili APA, Harvard, Vancouver, ISO e altri
38

Knapp, Kenneth J., Thomas E. Marshall, R. Kelly Rainer Jr. e F. Nelson Ford. "Information Security Effectiveness". International Journal of Information Security and Privacy 1, n. 2 (aprile 2007): 37–60. http://dx.doi.org/10.4018/jisp.2007040103.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
39

Jahankhani, Hamid, Shantha Fernando, Mathews Z. Nkhoma e Haralambos Mouratidis. "Information Systems Security". International Journal of Information Security and Privacy 1, n. 3 (luglio 2007): 13–25. http://dx.doi.org/10.4018/jisp.2007070102.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
40

Лихачева e G. Likhacheva. "Information technology security". Safety in Technosphere 1, n. 6 (25 dicembre 2012): 70–73. http://dx.doi.org/10.12737/162.

Testo completo
Abstract (sommario):
Security issues of individual and society from new types of threats created by Internet information systems and technologies are considered in this article. Globalization has created conditions for emergence of information weapon that has generated not only information wars, but also evolutionary confrontations — creation of planetary system of mankind monitoring and management that will lead the mankind to the involution. Fight has moved to intellectual space. Security is provided with knowledge of main sleights and technologies of information weapon, means of its recognition, and protection methods against it. Knowledge of universe laws provides the evolutionary development of mankind.
Gli stili APA, Harvard, Vancouver, ISO e altri
41

Dotson, Daniel S. "Information Security Resources". Science & Technology Libraries 27, n. 3 (10 luglio 2007): 29–51. http://dx.doi.org/10.1300/j122v27n03_03.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
42

Gifford, E. A. "Electronic information security". IEEE Potentials 7, n. 4 (dicembre 1988): 26–30. http://dx.doi.org/10.1109/45.31568.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
43

Fried, Louis. "DISTRIBUTED INFORMATION SECURITY". Information Systems Management 10, n. 3 (gennaio 1993): 56–65. http://dx.doi.org/10.1080/10580539308906944.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
44

Tsujii, Shigeo. "On Information Security". IEEJ Transactions on Electronics, Information and Systems 107, n. 9 (1987): 792–97. http://dx.doi.org/10.1541/ieejeiss1987.107.9_792.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
45

Poore, Ralph Spencer. "Information Security Governance". EDPACS 33, n. 5 (novembre 2005): 1–8. http://dx.doi.org/10.1201/1079.07366981/45653.33.5.20051101/91005.1.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
46

Tipton, Harold, e Micki Krause. "Information Security Management". EDPACS 27, n. 12 (giugno 2000): 1. http://dx.doi.org/10.1201/1079/43258.27.12.20000601/30344.4.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
47

Fitzgerald, Kevin J. "Information security baselines". Information Management & Computer Security 3, n. 2 (maggio 1995): 8–12. http://dx.doi.org/10.1108/09685229510088575.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
48

Williams, Paul. "Information Security Governance". Information Security Technical Report 6, n. 3 (settembre 2001): 60–70. http://dx.doi.org/10.1016/s1363-4127(01)00309-0.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
49

Eloff, J. H. P., e M. M. Eloff. "Information security architecture". Computer Fraud & Security 2005, n. 11 (novembre 2005): 10–16. http://dx.doi.org/10.1016/s1361-3723(05)70275-x.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
50

Lundgren, Björn, e Niklas Möller. "Defining Information Security". Science and Engineering Ethics 25, n. 2 (15 novembre 2017): 419–41. http://dx.doi.org/10.1007/s11948-017-9992-1.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Offriamo sconti su tutti i piani premium per gli autori le cui opere sono incluse in raccolte letterarie tematiche. Contattaci per ottenere un codice promozionale unico!

Vai alla bibliografia