Communications planning
Internet Marketing (1999)
Formal Verification of Security Protocols – an Introduction Mads Dam KTH/CSC ACCESS – distributed management group.
Using your library software – what third parties will get to know about our library customers
Chapter 3: An overview of project planning