-
31
Review of "Hacking exposed web applications".
Publicat a ACM queue : architecting tomorrow's computing. (2006)Article -
32
Search considered integral.
Publicat a ACM queue : architecting tomorrow's computing. (2006)Article -
33
-
34
-
35
-
36
-
37
Keeping score in the IT compliance requirements.
Publicat a ACM queue : architecting tomorrow's computing. (2006)Article -
38
-
39
Seeking compliance nirvana.
Publicat a ACM queue : architecting tomorrow's computing. (2006)Article -
40
E-mail authentication what, why, how?.
Publicat a ACM queue : architecting tomorrow's computing. (2006)Article