Top Message
Top Message
Back to Home Page  |  Settings   |  Sign In
Web Education
Viewing 1-4 of 4 total results
Different Obfuscation Techniques for Code Protection ...
Procedia Computer Science 70 ( 2015 ) 757 – 763 Available online at www.sciencedirect.com 1877-0509 © 2015 The Authors. Published by Elsevier B.V.
 Single Page Web Applications Security
Journal of Mobile, Embedded and Distributed Systems, vol. VII, no. 2, 2015 ISSN 2067 – 4074 57 Social engineering is another way to gather sensitive information from users but it relies entirely on user weaknesses. One important principle in keeping sensitive data secure is avoid keeping it. Sensitive data should be kept only if it is
Projects – ISM – IT&C Security Master – Informatics ...
Journal of Mobile, Embedded and Distributed Systems. Scientific / Tech. Handbook. Information Security Handbook. Scientific. Maskitto Light WordPress Theme by Shufflehound. Content copyrights 2015 IT&C Security Master ism@ase.ro (+40) 021 319 19 00 / int 331. Home; About . Aims and Objectives ...
ism.ase.ro/?page_id=101
Average Rating (0 votes)
IE 2015 – The 14th International Conference on Informatics ...
Journal of Mobile, Embedded and Distributed Systems (JMEDS) – www.jmeds.eu; International Journal of Economic Practices and Theories (IJEPT) – www.ijept.org; and will be indexed by major databases: ISI Thomson Reuters Services Directory of Open Access Journal Cabell’s Directories of Publishing Opportunities