2 Questions 13 Answers 0 Followers
Questions related from Aws Naser Jaber
I'm confuse for some related articles mentions that the Vulnerability Management have the Audit process. While, As I know Audit is complete separate audit.Another question what is the most...
13 November 2019 7,514 3 View
I try to search one paper between 2014-2016 talk about encrypt the data in cloud computing using ECDH + ANN. Thanks
28 March 2016 619 7 View