-
421
Review of "Hacking exposed web applications".
Publié dans ACM queue : architecting tomorrow's computing. (2006)Article -
422
-
423
-
424
-
425
Review of "Protect your windows network from perimeter to data".
Publié dans ACM queue : architecting tomorrow's computing. (2006)Article -
426
E-mail authentication what, why, how?.
Publié dans ACM queue : architecting tomorrow's computing. (2006)Article -
427
-
428
-
429
Better, faster, more secure.
Publié dans ACM queue : architecting tomorrow's computing. (2006)Article -
430