2014: Mid-Year Threat Review
Automated Security for iOS and Android Devices
Mobile threat report_q3_2013
©2013 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Best Practices to Secure the Mobile Enterprise Macy Torrey [email protected].
Report on Rogue Security Software
Cyber Crime
Sophos Control Center startup guide
Social Media Roundup - 9 Critical Steps: Protecting Yourself on Facebook
Summary2010
Pertemuan 15 ancaman sistem keamanan komputer
Sistem Keamanan Komputer
Moses Supporting And Enforcing Security Profiles On Smartphones