Back to Results
First PageMeta Content
Internet / Computer crimes / Social engineering / Decepticons / Border Gateway Protocol / Phishing / Request Tracker / Torpig / Megatron / Fictional technology / Predacons / Computing


Redesigning CERT.at’s incident handling capabilities – cherrypicking and learning from AH and Megatron L. Aaron Kaplan 
Add to Reading List

Document Date: 2012-05-14 06:32:04


Open Document

File Size: 575,89 KB

Share Result on Facebook

Person

L. Aaron Kaplan / /

ProgrammingLanguage

Perl / /

Technology

Perl / /

URL

http /

SocialTag