http://fourier-sys.com/product_data_nova.html
Basically a large screen windows ce pda, happens to have some data aquisition equipment in it as well.
How to conduct a vulnerability assessment
-
The realm of information security is fraught with jargon, as anyone who has
come across vulnerability-related terms can tell you. To complicate matters
f...
45 minutes ago
No comments:
Post a Comment