Return to Article Details Mechanisms targeting cyber terrorism in Egyptian legislation Download Download PDF