AIX Installation Checklist GIAC 101905
Liaatsecurity PDF
Seguridad en DB2..pdf
Inspection of Windows Phone applications
AIX
D01.2 Technical Leader report on Open Trusted Computing Strategy
1 Computer Security in the Real World Butler Lampson Microsoft August 2005.
Bytecode Verification on Java Smart Cards Xavier Leroy Presentation(day 1) -Nithya.
Trusted System Elements and Examples CS461/ECE422 Fall 2011.
AIX Administration Knowledge Share
Trusted Computing Base
IBM Certification Study Guide - pSeries AIX System Administration