The Importance of Security Awareness Training Submitted by rest1 on Wed, 12/17/2025 - 11:23 Read more about The Importance of Security Awareness Training
A new methodology for security evaluation in cloud computing Submitted by rest1 on Wed, 12/17/2025 - 11:23 Read more about A new methodology for security evaluation in cloud computing
Security in Computing Submitted by rest1 on Wed, 12/17/2025 - 11:23 Read more about Security in Computing
Current trends in Smart City initiatives: Some stylised facts Submitted by rest1 on Wed, 12/17/2025 - 11:22 Read more about Current trends in Smart City initiatives: Some stylised facts
Incident-centered information security: Managing a strategic balance between prevention and response Submitted by rest1 on Wed, 12/17/2025 - 11:22 Read more about Incident-centered information security: Managing a strategic balance between prevention and response
Incident management Submitted by rest1 on Wed, 12/17/2025 - 11:22 Read more about Incident management
Computer Security Incident Handling Guide Submitted by rest1 on Wed, 12/17/2025 - 11:22 Read more about Computer Security Incident Handling Guide
Articulating Design Decisions Submitted by rest1 on Wed, 12/17/2025 - 10:24 Read more about Articulating Design Decisions
The Design Manager’s Handbook. Submitted by rest1 on Wed, 12/17/2025 - 10:23 Read more about The Design Manager’s Handbook.