Monday, June 10, 2013
Summary of Network Security Conference (#NetworkSecurity) 2013
Labels:
Apps Security,
Conferences and Events,
LTE,
M2M,
Network Architecture,
Security
Subscribe to:
Post Comments (Atom)
Latest News and Information on 4G, 5G, 6G, and other Wired & Wireless Technologies in General.
3 comments:
Very good set of slides. Thanks for sharing this info.
Thanks for putting together the slides. Very informative.
Mitnick says in "Art of intrusion" that even a switched down computer could be switched on by manipulated people. The assumption can be considered true for mobile phones.
Post a Comment