Business Continuity and Resiliency
Security Dangers of Social Networking
Bridging the air gap
Dr Helene Lavoix - Keynote presentations and speeches, Workshop and conference organisation, Facilitation
Shodan Search Engine: Amphion Forum San Francisco
Supercomputer End Users: the OptIPuter Killer Application
14 june
Cyber war scenario what are the defenses
Whitepaper on SAP data loss or information Vulnerabilities can be stopped better implementation of Two Factor Authentication
SPIE Conference V3.0
United States Navy 2008 Stability and Security Conference Report
Identity Theft: How It Happens, Impact on Victims, and Legislative Solutions Beth Givens Privacy Rights Clearinghouse 3rd Annual Privacy and Security Conference.