GCIT Candidate Questionnarie for Prescreening - BA
Mobile binary code - Attack Tree and Mitigation
Attack Tree for Stealing the Binary Code (OWASP_2013 Top 10 Mobile Risk)
Linux Server Hardening - Steps by Steps
Automation Extraction of Side Effect Information from Consumer drug reviews