Juniper idp overview
A jade implemented mobile agent based host platform security
Pivotal role of intelligence analysis in ILP
Writing Sample on Cyber Defense Organization
IT Executive Guide to Security Intelligence Transitioning From SIEM to Total Security Intelligence
Designing Governance for Native Hawaiians
Secure your businesses with effective DDos protection services
Whitepaper: Streamlining Identity and Access Management through Unified Identity and Access Governance Solutions - Happiest Minds
[1.1] Почему вам стоит поучаствовать в жизни OWASP Russia - Александр Антух
Review of Robust Cooperative Spectrum Sensing Techniques for Cognitive Radio Networks
mobile ip
Protecting Mobile Agents from Malicious Host Nathan Balon.