BYOD and Implications for Network Security
|
Common network attacks and the shortcomings of standard network defences
|
Encryption and network protocols
|
Fortune favours the brave
|
Mazer Game Design and Network Security
|
Protocols, Packets and Prototypes
|
Thoughts on Multiplayer Game Co-operation and Distributed Computing
|