#1
The Term Sheet | Wattys 2016 Winnerby Lucas Carlson
2016 WATTY AWARD WINNER - HQ LOVE
THE TERM SHEET is a fast-paced technothriller about entrepreneurship, startups, encryption, and the delicate balance between national s...
Completed
#2
Crynime: Encryptionby Kimie Ishikawa
"Guys?"
No answer.
"Russ, Red, Raven, Jund, Snake? Hey?"
An eerie, sea-green light slowly filled the room.
(O.D.D.- All credits go to Kiwa-san (≧∇≦))
#3
Quantum cryptographic systemby Bedwyr Poppe
Exploring the world of quantum encrypted communication.
Completed
#5
RPost Donates RMail Security Servi...by jacques mills
RPost is offering its RMail® email security services for free to individuals impacted by the Ukraine crisis, providing essential tools for secure communication and prote...
#6
Xerox Launches Workflow Central wi...by jacques mills
Xerox integrates RPost's RDocs technology into its Workflow Central Platform, introducing 'Protect' for real-time control and enhanced document security.
#8
The Third Symbolby DorisDraussen
Two scientists have gone missing from their laboratory in Nyanza, at the source of the river Nile. Only Jamal can save them. All he has to go on is the notebook they lef...
#9
RPost to Showcase Advanced RMail P...by jacques mills
RPost unveils RMail's enhanced Pre-Crime suite to combat wire fraud, invited by RESPRO to showcase advanced cybersecurity for the real estate sector.
#10
The Octopus at the Vaticanby christopheSmercier
Italy 1978, years of lead. Alessa, the young journalist, investigates frequent crimes at her own risk. The Vatican is laundering money for the mafia. Against all odds, A...
#11
Master Remote Work with Jedi Mind...by jacques mills
Learn Jedi-inspired tips to enhance remote work communication.
#12
The encryptedby Merly231
This will be a totally different book not because of the story but due to the concept of it. I'm sure you don't see this too often that's why I decided to create somethi...
#13
Cloud-Based Security Solution- Bit...by BitTruster
BitTruster has committed to offer and provide for its customers the easiest, most centralized and cost-effective BitLocker implementation solution. BitTruster with its c...
#14
Data Privacy in Cloud Computing: A...by Insider Market Research
6 Best Practices for Ensuring Data Privacy in Cloud Computing: 1. Encryption 2. Access Controls 3. Regular Audits & Monitoring 4. Data Minimization 5. Contractual Agreem...