Thomas Pyle <tpyle at stevens.edu> wrote: > It concerns implementation and design of security, focused on the lower > levels of computing, but with an emphasis on new designs for secure systems. Looks good! -Jan