Two factor authentication presentation mcit Situational awareness for computer network security Security threats and countermeasure in 3 g network Comparison between traditional vpn and mpls vpn Security in wireless la ns Saa s multitenant database architecture Improving intrusion detection system by honeypot Advanced persistent threat (apt)