Show pagesourceOld revisionsBacklinksBack to top Share via Share via... Twitter LinkedIn Facebook Pinterest Telegram WhatsApp Yammer Reddit TeamsRecent ChangesSend via e-MailPrintPermalink × IT:AD:Design:Investigations:Security (UP) IT:AD:Design:Investigations:Security IT:AD:Design:Investigations:Security:Authorisation IT:AD:Design:Investigations:Security:Authentication IT:AD:Design:Investigations:Distributed Data IT:AD:Design:Investigations:Distributed Identities IT:AD:Design:Investigations:Mobile IT:AD:Design:Investigations:MultiTenancy IT:AD:Design:Investigations:Navigation IT:AD:Design:Investigations:Reuse IT:AD:Design:Investigations:Reuse/Code Libraries IT:AD:Design:Investigations:Reuse:XActLib IT:AD:Design:Investigations:Rule Engines IT:AD:Design:Investigations:Rules:Validation IT:AD:Design:Investigations:Scalability IT:AD:Design:Investigations:Scriptability IT:AD:Design:Investigations:Search through Encrypted Data IT:AD:Design:Investigations:Understandability Nice graphics: http://www.bloomberg.com/infographics/2014-08-21/top-data-breaches.html Security -- Especially on Mobiles http://www.zdnet.com/nokia-hijacks-mobile-browser-traffic-decrypts-https-data-7000009655/ /home/skysigal/public_html/data/pages/it/ad/design/investigations/security.txt Last modified: 2023/11/04 22:56by 127.0.0.1