×
+ All Categories
Log in
English
Français
Español
Deutsch
The top documents tagged [security compromises]
Home >
security compromises
Sumanth Mallipeddi
31 views
How To Make Mobile Apps Secure - Mobile login multifactor authentication.
211 views
Cloud security : Boston AWS user group
872 views
Security Threats and Protection Mechanisms. Learning Objectives Internet security issues (intellectual property rights, client, communication channels,
219 views
Ponemon report : 'Critical Infrastructure: Security Preparedness and Maturity -
169 views
AWS Meet-up San Francisco: Cloud Security
766 views
Coding for Scale and Sanity
265 views
IBM Security Services Overview
236 views
Effects of SIM Boxes on QoS - By Don Reinhart - During iCompetences FRR2013
101 views
Computer Security: Principles and Practice by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 14 – Security Auditing 1.
228 views
1 Computer Security Principles and Practices Security Audit IT Security Management & Risk Assessment IT Security Controls, Plans & Procedures Gregory (Greg)
218 views
Software Engineering for Security: a Roadmap Presented by Aatash Patel Pangsha Qiu Huanzhong Qiu.
219 views
Next >