Circumvention of Technological Protection Measures
Recently, I re-organised my research article on legislation on circumvention of TPM and published in PISA Journal. In this issue, there was an article on iSCSI Resilience and Security which is a very precise introduction for security professionals.
Thanks for SC Leung's editions.
Comments