VOLUME 1, 2011
Virtualization Security,
Challenges and Solutions
Featured articles:
Auditing Security Risks
in Virtual It Systems
WWW.ISACA.ORg
Chain Exploitation —
Social Networks Malware
Simplify and Layer your Security
Approach to Protect Card data
And more...