Improve energy efficiency of secure disk systems - nas09
Data Masking Counter Attack to Identity Theft Paul Preston Data Masking: Counter Attack to Identity Theft.
Jericho - an alternative approach to Security
Security Within a Virtualized Environment:
"Think" Security Innovation
Zanaco 2014 anuual report
Malaysia Differences Between Islamic and Conventional
Brivo Style Guide
The Economics of Information Security: A Survey and Open Questions Ross Anderson, Tyler Moore Cambridge University.
Catur Iswahyudi 1. 2 Wired Equivalent Privacy (WEP) ◦ first security protocol defined in 802.11 Wi-Fi Protected Access (WPA) ◦ defined by Wi-Fi Alliance.
WLAN and IEEE 802.11 Security
Clear Gold - Water As A Strategic Resource In The Middle East