How to Define and Build an Effective Cyber Threat Intelligence Capability
2014
Essential Skills for Hackers
2015
Meeting People via WiFi and Bluetooth
2015
Deploying Secure Containers for Training and Development
2015
Cyber Security Awareness for CEOs and Management
2015
Automated Security Analysis of Android and iOS Applications with Mobile Security Framework
2015