WPDevCon: Windows Phone Developer Conference
The first WPDevCon: Windows Phone Developer Conference is the independent conference for software developers, marketers and entrepreneurs building applications for Windows Phone-powered smartphones. Windows Phone is poised for take off with Microsoft putting the engines on full power in 2012. Projected attendance is 500+ from across the globe. Exhibits admission is free! Receive a $100...
4th International Exhibition from 25 to 28 th September at NSE, Mumbai India
We, the organizers of Automation 2008 take great pleasure in extending an invitation for you to participate in the 4th Automation and Instrumentation show- Automation 2008 that is scheduled to be held at the Bombay Exhibition Center, Mumbai India. Automation 2008 is the only...
SANS Canberra 2008
Join SANS as we make a trip to Canberra, Australia, on 30 June - 5 July 2008!
In SANS tradition, we offer you a classic selection of hands-on training that is relevant to the challenges you face each day as an information security professional or manager. Australian, Mark Hofman will be teaching at this event along with other popular SANS instructors.
SEC401: SANS Security Essentials...
CFP: Nano-Network 2008
**************** Nano-Net 2008 *********************
CALL FOR PAPERS
3rd International Conference on Nano-Networks
Boston, USA, Sept 15-17, 2008
Sponsors: Create-Net, ICST, EU (IST-FET), ENIAC
Industry Sponsor: STMicroelectronics...
Cyber Crime Africa 2008
The nature of the present day attacks is very different from what the security community has been used to in the past. Rather than wide-spread worms and viruses that cause general havoc, attackers are directly targeting their victims in order to achieve monetary or military gain. These attacks are blowing right past firewalls and anti-virus and placing malware deep in the enterprise. Ideally,...
SANS Puerto Rico 2008
If your organization has an Internet connection and one or two disgruntled employees (and whose doesn't!), your computer systems will get attacked. From the five, ten, or even one hundred daily probes against your Internet infrastructure to the malicious insider slowly creeping through your most vital information assets, attackers are targeting your systems with increasing viciousness and...