×
Upload
Login
Download free for 30 days
Submit Search
Upload
Download free for 30 days
Login
×
×
×
×
×
×
stuimrozsm
3 Followers
8
SlideShares
3
Followers
Following
Follow
Unblock User
Block User
8
SlideShares
3
Followers
Activity
About
Presentations
(8)
See all
Application of Q methodology in critical success factors of information security risk management
14 years ago
•
1026 Views
Download
Information security legislation
14 years ago
•
344 Views
Download
Bluetooth protocol stack
14 years ago
•
6852 Views
Download
Defensive information warfare
14 years ago
•
541 Views
Download
Article review - "Sometimes the dragon wins: A perspective on information-age warfare"
14 years ago
•
645 Views
Download
Factors affecting advancement of diverse information technology workforce
14 years ago
•
852 Views
Download
Improving IT application services with six sigma
14 years ago
•
636 Views
Download
An analysis of steganographic techniques and terrorists can use them
14 years ago
•
923 Views
Download
Download
Download
Download
Download
Download
Download
Download
Download
×
Modal header