The 5 Point Driving System: The Habits of Professional Drivers
Milton Estrada, TUSC
The Future of Identity in the Cloud: Requirements, Risks and Opportunities - Marco Casassa Mont
Protect Against Security Breaches by Securing Endpoints with Multi-Factor Authentication
Jump Start to Amazon Web Services
Best Security Practices On AWS Cloud
IT Managed Services
Enterprise security: ransomware in enterprise and corporate entities
Host-based Security
2011 Digital Summit - Not So Cloudy - Agcaoili
10 Steps To Secure Agile Development
Management of Information Security, 4 th Edition Chapter 7 Security Management Practices.