i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation initiative
nullcon 2010 - Botnet mitigation, monitoring and management
Great Learning & Information Security - English edition
App locker
A model for reducing information security risks due to human error
Ved du, hvor dine data er - og hvem, der har adgang til dem? Ron Ben Natan, IBM US
When Keyboards are drawn - Urban Information Warfare Ofer Shezaf, Xiom February 2003 .
Ethics in Information Technology, Second Edition Updated by Carlotta Eaton, NRCC.
Chapter 18 Section 3 VictoryInEurope. Axis surrender in North Africa When France surrendered in 1940, Germany placed France’s territories in Africa under.
Malware. 2 Inhoud Historisch overzicht Malware Soorten Malware (+ werking) Virus, Worm, Trojan, botnet Andere Terminologie Exploit, Payload, Zero-day.
The 7 Deadly Sins of WordPress Security
Israel IT trends and positioning in networking and security