IT:AD:Design:Investigations:Security
(UP)
IT:AD:Design:Investigations:Security
IT:AD:Design:Investigations:Security:Authorisation
IT:AD:Design:Investigations:Security:Authentication
IT:AD:Design:Investigations:Distributed Data
IT:AD:Design:Investigations:Distributed Identities
IT:AD:Design:Investigations:Mobile
IT:AD:Design:Investigations:MultiTenancy
IT:AD:Design:Investigations:Navigation
IT:AD:Design:Investigations:Reuse
IT:AD:Design:Investigations:Reuse/Code Libraries
IT:AD:Design:Investigations:Reuse:XActLib
IT:AD:Design:Investigations:Rule Engines
IT:AD:Design:Investigations:Rules:Validation
IT:AD:Design:Investigations:Scalability
IT:AD:Design:Investigations:Scriptability
IT:AD:Design:Investigations:Search through Encrypted Data
IT:AD:Design:Investigations:Understandability
Nice graphics:
http://www.bloomberg.com/infographics/2014-08-21/top-data-breaches.html
Security -- Especially on Mobiles
http://www.zdnet.com/nokia-hijacks-mobile-browser-traffic-decrypts-https-data-7000009655/