Securing the Enterprise Mobile Perimeter
Big Data: 8 facts and 8 fictions
Information Security Cost Effective Managed Services
Cyber-Security Threats: Why We are Losing the Battle (and Probably Don't Even Know It)
It act and cyber crime
Juniper Networks 2011 Mobile Threats Report
1 CS5038 The Electronic Society Security 1: Security and Crime Online Well begin with a look at whats out there. In Security 2, well think about it all.
DETECTING A CYBER-ATTACK SOURCE IN REAL TIME R. Romanyak 1), A. Sachenko 1), S. Voznyak 1), G. Connolly 2), G. Markowsky 2) 1) Ternopil Academy of National.
PBA - 12.09.2013 Pass Bureau Association 46 th Annual Conference Nashville, 12 th September 2013 Fraud in the Airline Industry.
Challenges In The Morphing Threat Landscape Apr 2011, Arnhem Tamas Rudnai, Websense Security Labs.
DNS and Infrastracture DDoS Protection
ethical Hack