<body><script type="text/javascript"> function setAttributeOnload(object, attribute, val) { if(window.addEventListener) { window.addEventListener('load', function(){ object[attribute] = val; }, false); } else { window.attachEvent('onload', function(){ object[attribute] = val; }); } } </script> <div id="navbar-iframe-container"></div> <script type="text/javascript" src="https://apis.google.com/js/platform.js"></script> <script type="text/javascript"> gapi.load("gapi.iframes:gapi.iframes.style.bubble", function() { if (gapi.iframes && gapi.iframes.getContext) { gapi.iframes.getContext().openChild({ url: 'https://www.blogger.com/navbar/24008684?origin\x3dhttp://g1rma.blogspot.com', where: document.getElementById("navbar-iframe-container"), id: "navbar-iframe", messageHandlersFilter: gapi.iframes.CROSS_ORIGIN_IFRAMES_FILTER, messageHandlers: { 'blogger-ping': function() {} } }); } }); </script>

53cur!ty 6109

Girma Nigusse

SECURITY - White Papers, Webcasts and Case Studies - ZDNet

December 11, 2006

SECURITY - White Papers, Webcasts and Case Studies - ZDNet: "Authentication - Encryption
Biometrics, Digital Signatures, E-commerce Security, PKI, Smart Cards, SSL - TLS
Intrusion - Tampering
Spyware, Anti-Hacking, Anti-Virus, Denial of Service, Firewalls, Intrusion Detection Systems, Network Security, Spam - E-mail Fraud - Phishing, Telecom Security
Security Administration
Best Practices, Security Applications, Security Management, Security Standards, Security Tools"

source

leave a comment