« An Introduction to Data aliasing, AKA “tokenization” and “pseudonymization” | Main | Security in Context – Take 2 »

February 19, 2010

Comments

The comments to this entry are closed.

  • Burton Group Free Resources Stay Connected Stay Connected Stay Connected Stay Connected


Blog powered by Typepad