- Документmyawesomepresentation.pptxзагружено:a4060435
- ДокументPhigting the phisher - using web bugs and honeytokens to Investigate the source of phishing attacks.pdfзагружено:a4060435
- ДокументKnow Your Enemy Containing Conficker.pdfзагружено:a4060435
- ДокументGlastopf - A dynamic, low-interaction web application honeypot.pdfзагружено:a4060435
- ДокументMIPS_Vol2.pdfзагружено:a4060435