Back to Results
First PageMeta Content
Computer security / Cyberwarfare / OWASP / Data breach / Computer network security / Security / Secure communication


Mobile Vulnerability and Exploitation John Sawyer – InGuardians Tom Eston – SecureState Kevin Johnson – Secure Ideas John Sawyer
Add to Reading List

Document Date: 2012-04-18 21:56:50


Open Document

File Size: 2,26 MB

Share Result on Facebook

Company

InGuardians Inc. / SpyLogic.net / /

Facility

We store / /

IndustryTerm

Web Services / /

Person

John Sawyer / Kevin Johnson / Brenna / Tom Eston / /

Position

Author / Manager / SecureState Profiling & Penetration Team / Instructor and Author / Senior Security Consultant / Senior Security Analyst / /

ProvinceOrState

Florida / /

Technology

SSL / Cryptography / HTTP / Mobile devices / /

SocialTag