National Cyber Security Policy 2013

10 years ago 847 Views

Spear Phishing Methodology

11 years ago 1531 Views

Mobile Device Management (MDM)

11 years ago 15815 Views

IT Act 2000 Penalties, Offences with case studies

11 years ago 66603 Views

Information Rights Management (IRM)

11 years ago 12699 Views

Data Leakage Prevention (DLP)

11 years ago 13963 Views

Advanced persistent threats(APT)

11 years ago 5240 Views

Scada assessment case study

13 years ago 1249 Views

Virtualization security audit

13 years ago 923 Views