- Security Blog
- By Eduard Kovacs
- November 5th, 2013
ENISA Makes Recommendations on Using Cryptography to Protect Personal Data
Two studies addressed to system developers and maintenance engineers
- Nano-Biotechnology
- By Lucian Dorneanu
- July 4th, 2007
How Can We Protect Ourselves From Identity Theft Through New Wireless Technologies?
The phenomenon is continuously growing