Garland Group - Top Security Threats of 2011
Identity theft in the Cloud and remedies
5 Data Breach Charts for the Board Room
Absolute Software 2008 Annual Report
Data Versus Hunch. Beyond Meets Hyper Island. Turning Data into Creative Value
Reviving RIM
Web security chapter#2
Hasbe a hierarchical attribute based solution for flexible and scalable access control in cloud computing.bak
CNS - Hut3 - Mobile Application (In)Security
It secuirty policy guidelines and practices
Banking deregulation
Privacy preserving delegated access control in public cloud