Return to Article Details
Authentication of Digital Objects: lessons from a Historian's Research
Download
Download PDF