Circumvention of Technological Protection Measures


Recently, I re-organised my research article on legislation on circumvention of TPM and published in PISA Journal. In this issue, there was an article on iSCSI Resilience and Security which is a very precise introduction for security professionals.

Thanks for SC Leung's editions.



Comments

Popular posts from this blog

Risk on Radio

Softside of security

Root Certificate update and software design