×
+ All Categories
Log in
English
Français
Español
Deutsch
The top documents tagged [majority of security]
Home >
majority of security
The Good, the bad, and the ugly of Thin Client/Server Computing
669 views
Can you survive a zombie apocalypse? Based on the book The Zombie Survival Guide: Complete protection from the living dead by Max Brooks.
216 views
JaveOne 2010 - Distributed Identity Architecture
1.493 views
Stopping Advanced Attacks on their Onset: A Practical Look at Modern Day Prevention
584 views
1 Security as a Marketing Tool October 2009 Paul A. Moran CISSP, CISA, CGEIT Information Security & Compliance Office ARI ® – Automotive Resources International.
214 views
Mobility, Security, and Proof-Carrying Code Peter Lee Carnegie Mellon University Lecture 1 Course Overview July 10, 2001 Lipari School on Foundations of.
214 views
Linux Networking and Security Chapter 7 Security, Ethics, and Privacy.
226 views