Home / Početna strana     |     About me (English)     |     O meni (srpski)     |     Books / Knjige     |     Publications     |    Teaching / Predavanja     |     Projects, solutions / Projekti, rešenja     |     Google scholar profile     |      LinkedIn profile     |     Blog: Dragan on Security     |     B92 VIP Blog

Also see my Google scholar profile.

 

On this page you’ll find my:

  • Patents and patent applications
  • Papers, articles, publications and similar
  • Reviews of books, papers and other work by me
  • Citations of my books, papers, articles and other work

Note: Some of works contain links to other locations. These locations are not under my control and links can be changed or expired in meantime.


  Papers, articles, publications and similar
1. Dragan Pleskonjić: “Analiza kriptografskih metoda zaštite podataka”, magistarski rad, Elektrotehnički fakultet u Zagrebu, 1991.
2. Dragan Pleskonjic, “Wireless Intrusion Detection Systems (WIDS)”, 19th Annual Computer Security Applications Conference, December 8-12, 2003, Las Vegas, Nevada, USA

http://www.acsac.org/2003/case/thu-c-1330-Pleskonjic.pdf
http://www.acsac.org/2003/thu.html
http://www.acsac.org/2003/adv_pgm.pdf
http://www.acsac.org/2003/wip.html

3. Dragan Pleskonjic, “A Development Environment for Generating System for Universal Network Connecting” IEEE Technical Applications conference NORTHCON 96, November 1996, Seattle, Washington, USA

http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=564803
http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=564720

4. Dragan Pleskonjic, Fabrizio Virtuani, Oscar Zoggia: “Security Risk Management for Critical Infrastructures”, ItAIS 2011, Rome, Italy, October 7-8, 2011

http://www.itais2011.org/file/ItAIS%202011_final_programme_v6.pdf

5. Dragan Pleskonjic: „Artificial Intelligence and Machine Learning for better Information Security & Privacy“ – Invited Keynote Speaker and panelist, BISEC 2016 – 8th International Conference on Business Information Security, Belgrade, October 15, 2016

http://bisec.metropolitan.ac.rs/conference-programme/
http://bisec.metropolitan.ac.rs/agenda/

6. Dragan Pleskonjic: “Primena veštačke inteligencije i mašinskog učenja za unapređenje informacione bezbednosti“, Univerzitet u Beogradu, Fakultet organizacionih nauka (FON), gostujuće predavanje, 11. maj 2016.

http://www.fon.bg.ac.rs/2016/05/gostujuce-predavanje-na-temu-primena-vestacke-inteligencije-i-masinskog-ucenja-za-unapredjenje-informacione-bezbednosti/?lang=lat

7. Omerasevic, Damir; Pleskonjic, Dragan; Behlilovic, Narcis; Mrdovic, Sasa: “A Novel Steganography Approach for Hiding QR Codes by Using 2-D Discrete Wavelet Transformation”. Source: Journal of Information System Security. 2015, Vol. 11 Issue 2, p131-148. 18p.
8. Dragan Pleskonjic: “Location Based Services – Security and Privacy Aspects”, 6th Annual Telenor Security Conference GoToSec 2011, September 27-28, 2011, Belgrade
9. Dragan Pleskonjic: “Information Security and ISO 27001 Standard”, Commissioner for Information of Public Importance and Personal Data Protection, Belgrade, June 27, 2011
10. D. Pleskonjić, D. Kraković, N. Matković, V. Milutinović, S. Omerović, S. Tomažić: “Reduction of False Positive Intrusions by Using Neural Nets”, Invited paper, 8th IEEE International Conference – TELSIKS 2007, Serbia, Nis, September 26 – 28, 2007. On page(s): 7-10, ISBN: 978-1-4244-1468-0

http://www.ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=4375902&arnumber=4375925
http://www.telsiks.org.rs/

11. Dragan Pleskonjic, Nemanja Maček, Borislav Djordjević, Marko Carić, “Security of Computer Systems and Networks” Book Preview, ComSIS – The international journal published by ComSIS Consortium, Volume 4, Number 1, June 2007

http://www.comsis.org/archive.php?show=pprnst-4805

12. Milošević, M., Milošević, D., Pleskonjić, D. SIGURNOST SISTEMA ZA UPRAVLJANJE UČENJEM, XVI Naučno – stručni skup INFORMACIONE TEHNOLOGIJE – SADAŠNJOST I BUDUĆNOST, Zbornik radova: Informacione tehnologije 2011., ISBN:978-86-7664-097-3, Žabljak, 22.- 26. februar 2011, pp. 49-53

http://www.it.ac.me/zbornici/ZbornikIT11.pdf

13. Slobodan Obradović, Borislav Đorđević, Dragan Pleskonjić, “Sertifikati kao sredstvo za upravljanje javnim ključem”, Infoteh, Jahorina 2007.

http://www.etf.unssa.rs.ba/infoteh/rad/detalji.php?rad=318&p=detalji

14. Nemanja Maček, Borislav Đorđević, Dragan Pleskonjić, “Kriptografski zaštićeni Linux sistemi datoteka”, Infoteh, Jahorina 2007.

http://www.etf.unssa.rs.ba/infoteh/rad/detalji.php?rad=319&p=detalji

15. Borislav Đorđević, Nemanja Maček, Dragan Pleskonjić, “Linux ext3 sistem datoteka na kernelima 2.4 i 2.6”, Infoteh, Jahorina 2007.

http://www.etf.unssa.rs.ba/infoteh/rad/detalji.php?rad=388&p=detalji

16. Dragan Pleskonjic, Sanida Omerovic, Saso Tomazic, “Network Systems Intrusion: Concept, Detection, Decision, and Prevention”, IPSI BgD Transactions on Internet Research, January 2007, Volume 3, Number 1, ISSN 1820-4503

http://www.internetjournals.net/journals/tir/2007/January/Paper%2010.pdf

17. B. Đorđević, D. Pleskonjić, M. Carić and N. Maček: “Linux kernels: 2.6 versus 2.4 on the ext3 file systems”, IPSI 2006, Bled, Slovenia, Nov 30 to Dec 3, 2006.

http://www.lkn.fe.uni-lj.si/ipsi06/

18. Dragan Pleskonjic, Veljko Milutinovic, Nemanja Macek, Borislav Djordjevic, Marko Caric: “Psychological profile of network intruder”, IPSI 2006, Amalfi, Italy, March 23-26, 2006

http://www.internetconferences.net/amalfi2006/boa.doc

19. B. Đorđević, D. Pleskonjić, S. Mišković and N. Maček: “Linux File Systems comparison: 64bit Giants on the small FS”, IPSI 2006, Amalfi, Italy, March 23-26, 2006

http://www.internetconferences.net/amalfi2006/boa.doc

20. Dragan Pleskonjic, “Wireless Intrusion Detection and Prevention Systems”, Invited speaker at IDC IT Security Roadshow 2006, Belgrade, March 16, 2006.

Agenda: http://www.idc-cema.com/?showproduct=28041&action=Agenda&content_lang=ENG

Speaker Profile: http://www.idc-cema.com/?action=Speaker&showproduct=28041&nd=Analysts&speaker=211416&content_lang=ENG

Presentation: http://www.idc-cema.com/download/getpresentation.php?id=28041&content_lang=ENG&name=Dragan Pleskonjic.pdf

21. D. Pleskonjic: “Protecting wireless computer networks by using intrusion detection agents”, IPSI 2005, Venice, Italy, November 10-13, 2005

http://www.internetconferences.net/venice2005/bookOfAbstracts.doc

22. B. Đorđević, M. Carić, D. Pleskonjić, N. Maček, “GNU/Linux sistemsko programiranje – priručnik za laboratorijske vežbe”, Visoka škola elektrotehnike i računarstva, Beograd, 2007., ISBN 978-86-7982-009-9, knjiga – udžbenik

http://www.dragan-pleskonjic.com/books/

23. B. Đorđević, M. Carić, D. Pleskonjić, N. Maček: “UNIX arhitektura”, Visoka škola elektrotehnike i računarstva, Beograd, 2007., ISBN 978-86-85081-94-1, knjiga – udžbenik

http://www.dragan-pleskonjic.com/books/

24. D. Pleskonjić, N. Maček, B. Đorđević, M. Carić: “Sigurnost računarskih sistema i mreža”, Mikro knjiga, Beograd, 2007., ISBN 978-86-7555-305-2, knjiga – udžbenik

http://www.mikroknjiga.rs/store/prikaz.php?ref=978-86-7555-305-2

25. D. Pleskonjić, B. Đorđević, N. Maček, M. Carić: “Sigurnost računarskih mreža”, Viša elektrotehnička škola, Beograd, 2006., ISBN 86-85081-16-5, knjiga – udžbenik

http://www.dragan-pleskonjic.com/books/

26. D. Pleskonjić, B. Đorđević, N. Maček, M. Carić: “Sigurnost računarskih mreža – priručnik za laboratorijske vežbe”, Viša elektrotehnička škola, Beograd, 2006., ISBN 86-85081-49-1, knjiga – udžbenik

http://www.dragan-pleskonjic.com/books/

27. D. Pleskonjić, B. Đorđević, N. Maček, M. Carić: “Sigurnost računarskih mreža – zbirka rešenih zadataka”, Viša elektrotehnička škola, Beograd, 2006., ISBN 86-85081-55-6, knjiga – udžbenik

http://www.dragan-pleskonjic.com/books/

28. B. Đorđević, D. Pleskonjić, N. Maček: “Operativni sistemi: teorija, praksa i rešeni zadaci”, Mikro knjiga, Beograd, 2005., ISBN 86-7555-274-2, knjiga – udžbenik

http://www.mikroknjiga.rs/store/prikaz.php?ref=86-7555-274-2

29. B. Đorđević, D. Pleskonjić, N. Maček: “Operativni sistemi: koncepti”, Viša elektrotehnička škola, Beograd, 2004., ISBN 86-85081-10-6, knjiga – udžbenik

http://www.dragan-pleskonjic.com/books/

30. B. Đorđević, D. Pleskonjić, N. Maček: “Operativni sistemi: UNIX i Linux”, Viša elektrotehnička škola, Beograd, 2004., ISBN 86-85081-03-3, knjiga – udžbenik

http://www.dragan-pleskonjic.com/books/

31. B. Đorđević, D. Pleskonjić, N. Maček: “Operativni sistemi: zbirka rešenih zadataka”, Viša elektrotehnička škola, Beograd, 2005., ISBN 86-85081-15-7, knjiga – udžbenik

http://www.dragan-pleskonjic.com/books/

32. B. Đorđević, S. Mišković, D. Pleskonjić, N. Maček and V. Milutinović: “Linux File Systems comparison: ext3 vs ext2”, IPSI-2004s (International Conference on Advances in Internet, Processing, Systems, and Interdisciplinary Research), Studenica Monastery, Serbia, June 3 – 6, 2004

http://studenica.internetconferences.net/BookOfAbstractsContents.pdf

33. Borislav Đorđević, Nemanja Maček, Dragan Pleskonjić, Stanislav Mišković, Borislav Krneta, Predrag Gavrilović: “Performanse ext3 fajl sistema pri različitim režimima vođenja dnevnika transakcija”, XLVIII konferencija ETRAN-a, Čačak, 6 – 10. juna 2004. godine

http://etran.etf.bg.ac.yu/files/program_etran_2004.pdf

34. Dragan Pleskonjić: “Modularni konvertor protokola”, INFO Časopis za informatiku, računarstvo i telekomunikacije, br. 2/94
35. Dragan Pleskonjić: “Modularni konvertor protokola”, XXXVIII konferencija za elektroniku, telekomunikacije, računarstvo, automatiku i nuklearnu tehniku – ETRAN, Niš, jun 1994.
36. Dragan Pleskonjić, Tomislav Pijevac: “Heterogena računarska mreža za podršku CIM okruženja Lola Instituta”, 25. Savetovanje proizvodnog mašinstva Jugoslavije, Beograd, septembar 1994.
37. Dragan Pleskonjić: “EDI usluge u složenom poslovnom sistemu”, Prva YU EDI konferencija, Brezovica, 26.-28. maj 1993.
38. Dragan Pleskonjić: “IBM LAN – osnovni kurs”, Lola Institut, Beograd, 1992.

Ovaj rad je materijal za kurs koji se održavao u Lola Institutu za korisnike IBM lokalnih računarskih mreža.

39. Dragan Pleskonjić: “Bezbednost podataka i mreže”, Seminari o elektronskoj razmeni podataka (EDI), Lola Institut, Beograd, 1993.
40. Dragan Pleskonjić: “Sigurnosni mehanizmi u mrežama mikroračunara”, MIPRO 91, Savetovanje o mikroračunarima u telekomunikacijama, Opatija 1991.
41. Nebojša Urošević, Dragan Pleskonjić: “Zbirka zadataka za predmet Računarske komunikacije i mreže”, VVTŠ JNA, Zagreb, 1991.

Zbirka zadataka je urađena prema nastavnom planu i programu za predmet Računarske komunikacije i mreže. Internog je karaktera i štampana je u obliku radnog materijala za studente.

42. Nebojša Urošević, Dragan Pleskonjić: “Uputstva za laboratorijske vežbe iz predmeta Računarske komunikacije i mreže”, VVTŠ JNA, Zagreb, 1991.

Uputstvo za laboratorijske vežbe sadrži deset vežbi prema nastavnom planu i programu za predmet Računarske komunikacije i mreže. Štampano je u obliku radnog materijala za studente i internog je karaktera.

43. Grupa autora: “Osnove programiranja – zbirka zadataka”, VVTŠ JNA, Zagreb, 1990., koautor

Zbirka zadataka za predmet Osnove programiranja sadrži rešene zadatke za programske jezike Pascal i FORTRAN. Zbirka je štampana u obliku radnog materijala za studente i internog je karaktera.


  Articles in popular computer and technology magazines and journals
44. Dragan Pleskonjić, Dejan Vesić: “Pilići na Facebook-u | Pile moje…”, PC Press #180, Septembar 2011.
45. Dragan Pleskonjić: “Superbrze LAN – LAN na mlazni pogon”, Računari br. 81, april 1992.
46. Dragan Pleskonjić: “Token Ring, LAN Program, LAN Server – Server plavog prstena”, Računari br. 80, mart 1992.
47. Dragan Pleskonjić: “Računarske mreže”, Trend / elektronika, br. 48, septembar 1991.
48. Dragan Pleskonjić: “PC i LAN – Zaštita podataka”, Trend / elektronika, br. 45, jun 1991.
49. Dragan Pleskonjić: “Sigurnost računarskih sistema i mreža”, Trend / elektronika, br. 43, april 1991.
50. Dragan Pleskonjić:  “Da li je algoritam DES neprobojan”, Moj mikro, mart 1991.
51. Dragan Pleskonjić: “Kriptografski sistemi sa javnim ključevima – Zaključaj podatke javnim ključem”, Moj mikro, februar 1991.
52. Dragan Pleskonjić: “Kriptografija – Od Cezara do standarda DES” Moj mikro, januar 1991.

  Reviews of books, papers and other work by me
1. Elsevier Computers & Security – The official journal of Technical Committee 11 (computer security) of the International Federation of Information Processing, with impact factor on Thomson SCI list
2. International Journal of Networking and Virtual Organizations (IJNVO)
3. ComSIS (Computer Science and Information Systems) International Journal
4. “Internet protokoli i tehnologije – priručnik za laboratorijske vežbe”, dr Verica Vasiljević, Predrag Gavrilović, Borislav Krneta, Mina Kamberović, Visoka škola elektrotehnike i računarstva strukovnih studija, Beograd, 2015., ISBN: 978-86-7982-223-9
5. „Korporacijske komutacione mreže – priručnik za laboratorijske vežbe“, Verica Vasiljević, Vladimir Mihajlović, Miloš Roknić, Visoka škola elektrotehnike i računarstva strukovnih studija, Beograd, 2015., ISBN: 978-86-7982-214-7
6. “Administracija i projektovanje računarskih mreža – priručnik za laboratorijske vežbe”, dr Verica Vasiljević, Predrag Gavrilović, Borislav Krneta, Veselin Ilić, Vladimir Mihajlović, Visoka škola elektrotehnike i računarstva strukovnih studija, Beograd, 2011., ISBN: 978-86-7982-213-0
7. “Računarske mreže”, Udžbenik, Slobodan Obradović, Nemanja Maček, Viša ekonomska škola, Valjevo, 2007, ISBN 978-86-81053-38-6
8. “Protokoli u računarskim mrežama”, Priručnik za laboratorijske vežbe, Verica Vasiljević, Predrag Gavrilović, Borislav Krneta, Mladen Krstanović, Nemanja Maček, Boško Bogojević, Viša elektrotehnička škola; Beograd, 2004, ISBN 86-85081-00-9
9. “Projekat baze podataka Informacionog sistema InfoVETŠ”, Autori projekta: Slobodan Obradović, Dejan Vasiljević; Beograd, 2001.
10. “Administracija računarskih mreža”, Praktikum za laboratorijske vežbe Računarske mreže, mr Verica Vasiljević, inž.el. Predrag Gavrilović, inž.el. Borislav Krneta, Viša elektrotehnička škola; Beograd, 2000
11. “Projekat informacionog sistema Više elektrotehničke škole”, Autor projekta: Slobodan Obradović; Beograd, 1999.
12. “Kompjuterski bukvar”, BMG Beograd, 1996.
13. “CA Clipper 5.2 – Mrežno programiranje”, Mikro knjiga; Beograd 1994., ISBN 86-7555-026-X
14. “Uvod u Novell NetWare”, Mikro knjiga; Beograd 1994., ISBN 86-7555-024-3
15. “Vodič za povezivanje”, Mikro knjiga; Beograd 1993., ISBN 86-7555-023-5

  Citations of my books, papers, articles and other work

Note: this is partial list, visit Google Scholar and similar locations for additional details.

1. George Lawton, “Fighting Intrusions into Wireless Networks”, IEEE Computer, vol. 43, no. 5, pp. 12-15, May 2010, doi:10.1109/MC.2010.137

http://doi.ieeecomputersociety.org/10.1109/MC.2010.137

2. Jakub Lickiewicz, “Cyber Crime Psychology – Proposal of an Offender Psychological Profile”, Problems of Forensic Sciences, 2011, Vol. 87 (LXXXVII) pp. 239-252, ISSN 1230-7483, reference [25]

http://www.forensicscience.pl/component/option,com_jbook/task,view/Itemid,2/catid,72/id,664/lang,en/

http://www.forensicscience.pl/pfs/87_Lickiewicz.pdf

3. Asmaa Shaker Ashoor, Sharad Gore: “How can distinguish between Hackers and Intruders”, 2011 International Conference on Future Information Technology, IPCSIT vol.13 (2011) © (2011) IACSIT Press, Singapore, reference [4]

http://www.ipcsit.com/vol13/6-ICFIT2011-F014.pdf

4. Guillen, E.; Padilla, D.; Colorado, Y.: “Weaknesses and strengths analysis over network-based intrusion detection and prevention systems,” Communications, 2009. LATINCOM ’09. IEEE Latin-American Conference, vol., no., pp.1-5, 10-11 Sept. 2009, doi: 10.1109/LATINCOM.2009.5305047, reference [5]

http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5305047&isnumber=5304383

5. Debananda Padhi and Debabrata Senapati: “An Approach to Wireless Intrusion Detection System for Wireless Network based on Multiagent System of Ant Colony Optimization Algorithm”, IJCA Special Issue on 2nd National Conference- Computing, Communication and Sensor Network (CCSN) (1):13-18, 2011. Published by Foundation of Computer Science, New York, USA.

http://research.ijcaonline.org/ccsn/number1/ccsn004.pdf

6. Deepthi N. Ratnayake, Hassan B. Kazemian, Syed A. Yusuf and Azween B. Abdullah: “An Intelligent Approach to Detect Probe Request Attacks in IEEE 802.11 Networks”, Engineering Applications of Neural Networks, IFIP Advances in Information and Communication Technology, Springer Boston, 2011, Volume 363/2011, page 372-381, DOI: 10.1007/978-3-642-23957-1_42, reference [16]

http://dx.doi.org/10.1007/978-3-642-23957-1_42

7. Asmaa Shaker Ashoor, Prof. Sharad Gore: “What is the difference between Hackers and Intruders”, International Journal of Scientific & Engineering Research Volume 2, Issue 7, July-2011, ISSN 2229-5518, reference [4]

http://www.ijser.org/researchpaper%5CWhat_is_the_difference_between_Hackers_and_Intruders.pdf

8. Book: Novel Algorithms and Techniques in Telecommunications and Networking, Publisher: Springer Netherlands

DOI 10.1007/978-90-481-3662-9, 2010, Paper: Ricardo Luis da Rocha Ataide, Zair Abdelouahab: “An Architecture for Wireless Intrusion Detection Systems Using Artificial Neural Networks”, Pages 355-360, reference [19]

http://www.springerlink.com/content/l87t236573023248/

http://books.google.com/books?hl=en&lr=&id=k8YXeEcmRgQC&oi=fnd&pg=PA354&ots=9-XO6fIHKK&sig=Q4e-CG43sEO7OG-Tt-yCmbyqxoA#v=onepage&q&f=false

9. Slobodan Petrović, ”Vulnerabilities in wireless networks and intrusion detection”, Telektronikk Journal 1.2005, Information Society and Security reference [14]

http://www.telektronikk.com/volumes/pdf/1.2005/Page_086-091.pdf

10. Ivan Đokić, Irfan Fetahović, Aleksandra Pavlović, “Dvoslojna proaktivna zaštita računarske mreže od malicioznog softvera”, 18. Telekomunikacioni forum TELFOR 2010, Beograd, Srbija, reference [8]

http://2010.telfor.rs/files/radovi/TELFOR2010_02_26.pdf

11. Vanja Bevanda, Jasmin Azemovic, Denis Mušic, “Privacy Preserving in eLearning Environment (Case of Modeling Hippocratic Database Structure),” bci, pp.47-52, 2009 Fourth Balkan Conference in Informatics, 2009, reference [3]

http://doi.ieeecomputersociety.org/10.1109/BCI.2009.20

12. Ranđelović Dragan, Đorđević Vladan: “Jedan test primer primene IDS otvorenog i zatvorenog koda”, Nauka, bezbednost, policija, vol. 16, br. 3, str. 45-64, 2011

http://scindeks.nb.rs/article.aspx?artid=0354-88721103045R

13. Đikanović Predrag, Mojsilović Željko, “Primena SMART kartica kao identifikacionih dokumenata”, Bezbednost, Beograd, vol. 52, br. 3, str. 139-157, 2010
14. Popravak Slaviša, Dedić Velimir, “Primena heš funkcija u CHAP autentifikaciji”, Info M, 2010, vol. 8, br. 33, str. 41-46
15. Ranđelović Dragan, Bogdanović Tijana, “Alati za digitalnu forenziku”, Nauka, bezbednost, policija, 2010, vol. 15, br. 2, str. 25-47
16. Ranđelović Dragan, Delija Damir, Popović Brankica, “EnCase forenzički alat”, Bezbednost, Beograd, vol. 51, br. 1-2, str. 286-312, 2009, reference [4] and [9]
17. Ranđelović D., Petrović L., Radovanović R., Popović B., “Sigurnosni protokoli”, Nauka, bezbednost, policija, vol. 14, br. 1, str. 89-116, 2009, reference [2]
18. Dragoljub Pilipović, “Karakteristike sigurnosti Encrypting File System-a”, e-RAF Journal on Computing, Vol. 1, 2009, reference [3]
19. Dragoljub Pilipović, Dejan Stjepanović, “Performanse kriptovanja na sistemima datoteka”, 16. Telekomunikacioni forum TELFOR 2008 Srbija, Beograd, novembar 25.-27., 2008, reference [5]
20. Dolinsek Andreas, Forrer Manuel, Höll Bernhard, Marktl Gunther, ”Intrusion Detection”, Graz University of Technology, IAIK Institute for Applied Information Processing and Communications, February 2008, reference [Ple07]
21. Čisar Petar, “Informaciona arhitektura u funkciji razvoja mobilnog bankarstva”, Anali Ekonomskog fakulteta u Subotici, br. 19, str. 183-191, 2008, reference [2]
22. Čisar Petar, Bošnjak Saša, “Digitalni sertifikati u funkciji upravljanja rizicima”, Strategijski menadžment, vol. 12, br. 3-4, str. 77-80, 2007, reference [3]
23. Jović Goran, Mladenović Ilija, Mladenović Marina, “Zaštita informacionih sistema”, Zbornik radova Tehnološkog fakulteta, Leskovac, br. 17, str. 174-183, 2007, reference [4]

 


 

Share this... Tweet about this on TwitterShare on LinkedInShare on FacebookShare on Google+Email this to someone