Showing 1 - 1 of 1
Database, Suchit Leesa-nguansuk, Published on 27/01/2010
» The increasing popularity of social networking and new technology development in cloud and virtualisation environment as well as new operating systems create loopholes for security threats in 2010.