×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [higherlevel security]
White Paper: How to conduct a code review effective techniques for uncovering vulnerabilities in your code
7.125 views
Trusted computing: implementing virtual identity Dave Birch. Director, Consult Hyperion.
[email protected]
Introduction Trusted computing TCPA & Palladium
219 views
Browsers or Buyers in Cyberspace an Investigation of Factors Influencing Electronic Exchange
41 views
Chen-Nee Chuah Robust & Ubiquitous Networking (RUBINET) Lab Electrical & Computer Engineering University of California,
213 views