2015/06/246 [Rajiv Dholakia] Mobile Security, Identity & Authentication CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - Rajiv Dholakia from CloudIDSummit 2015. 6. 24. [a16z] Mobile: It Changes Everything Mobile: It Changes Everything from a16z 2015. 6. 24. [US-CERT: Bulletin(SB15-173)] 2015년 6월 15일까지 발표된 보안 취약점 The vulnerabilities are based on the CVE vulnerability naming standard and are organized according to severity, determined by the Common Vulnerability Scoring System (CVSS) standard. The division of high, medium, and low severities correspond to the following scores: High - Vulnerabilities will be labeled High severity if they have a CVSS base score of 7.0 - 10.0 Medium - Vulnerabilities will be.. 2015. 6. 24. [ThoughtWorks] Delivering with Microservices - How to Iterate Towards Sophistication Delivering with Microservices - How to Iterate Towards Sophistication from ThoughtWorks 2015. 6. 24. 이전 1 2 다음