Circumvention of Technological Protection Measures


Recently, I re-organised my research article on legislation on circumvention of TPM and published in PISA Journal. In this issue, there was an article on iSCSI Resilience and Security which is a very precise introduction for security professionals.

Thanks for SC Leung's editions.



Comments

Popular posts from this blog

Stealing credit card numbers via home Wifi network

Risk on Radio

Unsolicited Electronic Messages Bill