Security

Using War Games to Find IT Vulnerabilities

Registration not required

Executive Summary

The presenter describes how Intel uses war games to find IT vulnerabilities.

  • Format: PostScript (requires PS viewer)
  • Size: 0 KB