Submission
TFR 2015 Перевод интерфейсов мобильных устройств. Я.Юзипович
Top Cloud Threats v2.0 Cloud Security Alliance Michael Sutton, VP Research, Zscaler Dan Hubbard, CTO, Websense.
© 2013 Pearson. Controlling Access to Resources ◦ If criminals cannot get access, they cannot do harm. Authentication ◦ Proving one’s identity ◦ Cannot.
The Information Superhighway. An Information Infrastruture.