Circumvention of Technological Protection Measures


Recently, I re-organised my research article on legislation on circumvention of TPM and published in PISA Journal. In this issue, there was an article on iSCSI Resilience and Security which is a very precise introduction for security professionals.

Thanks for SC Leung's editions.



Comments

Popular posts from this blog

Risk on Radio

How the Security Breach Occurred

Root Certificate update and software design