2

From concept to production

Year:
2007
Language:
english
File:
PDF, 87 KB
english, 2007
4

Perspectives on Design and Innovation

Year:
1993
Language:
english
File:
PDF, 981 KB
english, 1993
5

The effectiveness of anti-malware tools

Year:
2009
Language:
english
File:
PDF, 85 KB
english, 2009
7

Securing the mobile device

Year:
2004
Language:
english
File:
PDF, 98 KB
english, 2004
8

Microsoft SDL Threat Modelling Tool

Year:
2009
Language:
english
File:
PDF, 384 KB
english, 2009
12

Warchalking and Bluejacking: Myth or reality

Year:
2004
Language:
english
File:
PDF, 327 KB
english, 2004
13

GSM Security

Year:
2004
Language:
english
File:
PDF, 97 KB
english, 2004
14

Wireless updates from Black Hat and DefCon

Year:
2004
Language:
english
File:
PDF, 169 KB
english, 2004
15

Quantum crypto: Star trek or real science?

Year:
2005
Language:
english
File:
PDF, 102 KB
english, 2005
16

User education – how valid is it?

Year:
2006
Language:
english
File:
PDF, 70 KB
english, 2006
17

Security automation

Year:
2007
Language:
english
File:
PDF, 85 KB
english, 2007
18

Converging wired and wireless authentication

Year:
2007
Language:
english
File:
PDF, 99 KB
english, 2007
23

The risks and rewards of design investment

Year:
1995
Language:
english
File:
PDF, 974 KB
english, 1995
30

Malignant giant cell tumor of the sphenoid bone and its differential diagnosis

Year:
1970
Language:
english
File:
PDF, 1.13 MB
english, 1970
38

Wireless Device Discovery

Year:
2003
Language:
english
File:
PDF, 31 KB
english, 2003
39

Wireless Authentication options for up and down the Stack

Year:
2003
Language:
english
File:
PDF, 226 KB
english, 2003
40

Next Generation Wireless Security Tools

Year:
2003
Language:
english
File:
PDF, 202 KB
english, 2003
41

Wireless security policies

Year:
2003
Language:
english
File:
PDF, 258 KB
english, 2003
42

Wireless-based location tracking

Year:
2003
Language:
english
File:
PDF, 35 KB
english, 2003
43

Bluetooth “vulnerabilities”

Year:
2004
Language:
english
File:
PDF, 126 KB
english, 2004
44

Wireless intrusion detection

Year:
2004
Language:
english
File:
PDF, 93 KB
english, 2004
45

Security to the edge

Year:
2004
Language:
english
File:
PDF, 66 KB
english, 2004
46

Fixing wireless security

Year:
2004
Language:
english
File:
PDF, 77 KB
english, 2004
47

802.16 security: getting there?

Year:
2004
Language:
english
File:
PDF, 80 KB
english, 2004
48

Is big boss watching you?

Year:
2005
Language:
english
File:
PDF, 67 KB
english, 2005
49

The value of Internet alerts

Year:
2004
Language:
english
File:
PDF, 51 KB
english, 2004
50

Big Boss is watching you — but should he?

Year:
2004
Language:
english
File:
PDF, 99 KB
english, 2004