Securing mobile devices_in_the_business_environment
Securing mobile devices 1
SHINE webinar - Business and Human Rights
Last lecture Chapter 1, 2, 3 and 4 Applying UML and Patterns -Craig Larman.