Содержание выпуска:
The changing face of hacking
Review: Crypto Adapter
A tech theory coming of age
SecurityByte 2011: Cyber conflicts, cloud computing and printer hacking
The need for foundational controls in cloud computing
A new approach to data centric security
The future of identity verification through keystroke dynamics
Visiting Bitdefender's headquarters
Rebuilding walls in the clouds
Testing Domino applications
Report: Black Hat 2011 USA
Комментариев нет:
Отправить комментарий