|
|
|
Thursday 21 January 2010
|
|
|
|
How to register for the Security Jam
The SDA reserves the right to deny access to the Security Jam to registrants who do no follow these criteria.
Privacy:
SDA/IBM will only use the information you provide in the context of the Jam, including its post-analysis and statistical findings. All provided contributions will remain anonymous in public reports, unless upon written approval in advance by authors. |
|
|
|
|
|
|
Login | Powered by IT Omni CMS |