From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Fighting botnets with sinkholes.. Netw. Secur., 2012 (8): 12-15 (2012)Hands-on with Metasploit Express.. Netw. Secur., 2010 (7): 7-11 (2010)Offensive defence.. Netw. Secur., 2013 (7): 9-12 (2013)Testing the defences of bulletproof hosting companies.. Netw. Secur., 2014 (6): 8-12 (2014)Avoiding URL hell.. Netw. Secur., 2010 (11): 4-6 (2010)Going, going, gone.. Digital Investigation, 3 (3): 112-114 (2006)Verifying software security - is it possible?. Netw. Secur., 2013 (1): 5-7 (2013)Microsoft's new window on security.. Comput. Secur., 25 (6): 405-407 (2006)A hole in the security wall: ATM hacking.. Netw. Secur., 2010 (6): 12-15 (2010)Routing around censorship.. Netw. Secur., 2011 (5): 5-8 (2011)