Back to Results
First PageMeta Content
Computer security / Identity management / Software as a service / Provisioning / Service-oriented architecture / Cloud computing security / Anakam / Computing / Cloud computing / Centralized computing


identity as the new perimeter: securely embracing cloud, mobile and social media
Add to Reading List

Document Date: 2014-10-14 11:25:43


Open Document

File Size: 3,65 MB

Share Result on Facebook
UPDATE