cxcv: 2008-05-27*

1 bookmark(s) - Sort by: Date ↓ / Title / - Bookmarks from other users for this tag

  1. How do you protect yourself from dataloss, espionage, trojans, spam and worms? Information security is of central importance to companies. In various workshops, practitioners inform about existing risks and possible counter actions. A live demonstration shows how hackers work and where you can find possible security holes.

Top of the page

First / Previous / Next / Last / Page 1 of 1 Bookmarks: Tags: 2008-05-27

About - Propulsed by SemanticScuttle