Cyber Adversary Characterization: Auditing the Hacker MindE-bookCyber Adversary Characterization: Auditing the Hacker MinddeMarcus SachsNota: 5 de 5 estrelas5/5Salve Cyber Adversary Characterization: Auditing the Hacker Mind para mais tarde
Securing IM and P2P Applications for the EnterpriseE-bookSecuring IM and P2P Applications for the EnterprisedeMarcus SachsNota: 0 de 5 estrelas0 notasSalve Securing IM and P2P Applications for the Enterprise para mais tarde