Introduction To Information Security
Threats of E-Commerce in Database
Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010
Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010
Teaching Johnny Not to Fall for Phish, for ISSA 2010 on May 2010
Teaching Johnny Not to Fall for Phish, for ISSA 2011 in Pittsburgh on Feb2011
Achieving Behavioral Change, for ISSA 2011 in San Francisco Feb 2011
© Prof. Till Hänisch, Prof. Dr. Hans Jürgen Ott 1 Univ. of Cooperative Education Heidenheim, Dpt. of Business Information Systems IT security A quick tour.
Open Source Software (OSS or FLOSS) and the U.S. Department Of Defense (DoD) DACS Webinar February 11, 2008 Presenter: David A. Wheeler Institute for Defense.
Design Requirements for Bullet-Proof Packet Passers Avi Freedman [email protected] Chief Technical Officer, Netaxs VP and Chief Network Architect, Akamai.
THE PON-SCOPE GRID INFRASTRUCTURE P.I. – Giuseppe Marrucci Astrophysics – Longo Electromagnetism - Franceschetti High energy Physics - Merola Computer.
Information Technology Infrastructure Committee (ITIC) Report to the NAC July 2012 Larry Smarr Chair ITIC.