-
1
-
2
-
3
-
4
Hacking exposed J2EE and Java developing secure applications with Java technology
Publicado 2002Libro -
5
-
6
A survey of customizability in operating systems research.
Publicado en ACM computing surveys.Artigo -
7
A secure multicast protocol with copyright protection.
Publicado en Computer communication review.Artigo -
8
-
9
-
10