-
31
Review of "Hacking exposed web applications".
Yayımlandı ACM queue : architecting tomorrow's computing. (2006)Makale -
32
-
33
-
34
-
35
-
36
-
37
Keeping score in the IT compliance requirements.
Yayımlandı ACM queue : architecting tomorrow's computing. (2006)Makale -
38
-
39
-
40
E-mail authentication what, why, how?.
Yayımlandı ACM queue : architecting tomorrow's computing. (2006)Makale