- DocumentPuppet Enterprise Report - April 23, 2013încărcat deHN
- DocumentPuppet Enterprise Presentation - April 18 2013încărcat deHN
- DocumentCombating Advanced Persistent Threat (Apt) in Windowsîncărcat deHN
- DocumentSystem Administration 2 - Logical Topologyîncărcat deHN
- DocumentProject 2încărcat deHN
- DocumentProject 2încărcat deHN
- DocumentKerberos Reportîncărcat deHN
- DocumentNetwork 2 Time Line (N2TM) - Linux volatile gathering tool - Presentationîncărcat deHN
- DocumentNetwork 2 Timeline Utility - Linux volatile gathering toolîncărcat deHN
- DocumentWireless Ad-hoc and Sensor Networks - "AntiTheft" Sensor Programîncărcat deHN
- DocumentSpanning Tree Protocol - Loop-free topologyîncărcat deHN
- DocumentSwatch - A simple Watchdog Utility - presentationîncărcat deHN
- DocumentEthics in Computingîncărcat deHN
- DocumentZigBee Sensor Network Security Reportîncărcat deHN
- DocumentFBI Guiding Principle and Impact Analysis Projectîncărcat deHN
- DocumentTai Chi All the Wayîncărcat deHN
- DocumentZigBee Sensor Network Security Presentationîncărcat deHN
- DocumentOpenVAS - Open Vulnerability Assessment Systemîncărcat deHN
- DocumentIntro to The Cloud Computingîncărcat deHN
- DocumentVietnamese Entered into a New World of Americaîncărcat deHN
- DocumentHazing in Fraternitiesîncărcat deHN
- DocumentPsychology In Advertisingîncărcat deHN
- DocumentNetworking Research - Coffee, Tea or Wifi?încărcat deHN