-
11
-
12
Review of "Hacking exposed web applications".
Published in ACM queue : architecting tomorrow's computing. (2006)Article -
13
Review of "Protect your windows network from perimeter to data".
Published in ACM queue : architecting tomorrow's computing. (2006)Article -
14
E-mail authentication what, why, how?.
Published in ACM queue : architecting tomorrow's computing. (2006)Article -
15
-
16
-
17
-
18
Fighting spam with reputation systems.
Published in ACM queue : architecting tomorrow's computing. (2005)Article -
19
Review of "The Linux enterprise by Karl Popper".
Published in ACM queue : architecting tomorrow's computing. (2005)Article -
20