and Security Technologies

Results: 1110



#Item
321Akamai Technologies / Content delivery network / Prolexic Technologies / Networks / Denial-of-service attack / Computing / Concurrent computing / Internet

AKAMAI WEB SECURITY SOLUTIONS: PRODUCT BRIEF Prolexic Flow-Based Monitoring Network-layer monitoring for early detection and notification of potential DDoS attacks Organizations increasingly interact with customers, em

Add to Reading List

Source URL: www.akamai.com

Language: English - Date: 2015-04-06 03:50:01
322Internet / Prolexic Technologies / Akamai Technologies / Denial-of-service attack / Network architecture / Denial-of-service attacks / Computer network security / Computing

AKAMAI WEB SECURITY SOLUTIONS: PRODUCT BRIEF Prolexic Connect As businesses and other organizations move increasingly online, the frequency, scale, and sophistication of denial-of-service (DoS) and distributed denial-of

Add to Reading List

Source URL: www.akamai.com

Language: English - Date: 2015-03-27 06:58:01
323Computer security / Denial-of-service attack / Internet Relay Chat / Internet security / Computing / Internet activism / Prolexic Technologies / Blue Frog / Computer network security / Denial-of-service attacks / Cyberwarfare

Cloud DDoS Protection Cloud DDoS Protection The internet revolution Most successful organisations have at least a basic web presence, and the most successful ones acknowledge that the internet is a key source of busine

Add to Reading List

Source URL: www.iomart.com

Language: English - Date: 2014-10-24 09:23:53
324Distributed file system / Network File System / File system / Client–server model / File server / Server / Capability-based security / Network-Attached Secure Disks / Blue Whale Clustered file system / Computing / Network file systems / System software

USENIX Association Proceedings of FAST ’03: 2nd USENIX Conference on File and Storage Technologies

Add to Reading List

Source URL: www.tim-mann.org

Language: English - Date: 2006-11-21 15:00:02
325Content delivery network / Computer network security / Prolexic Technologies / Denial-of-service attack / Network architecture / Speedera Networks / Internet / Computing / Akamai Technologies

AKAMAI WEB SECURITY SOLUTIONS: PRODUCT BRIEF Prolexic Application-Based Monitoring Application-layer monitoring for early detection and notification of potential DDoS attacks Organizations increasingly interact with cu

Add to Reading List

Source URL: www.akamai.com

Language: English - Date: 2015-03-23 10:16:01
326National security / Computer security / Data security / Computer network security / Chief information security officer / United States Department of Homeland Security / Security guard / Information security / Virginia Information Technologies Agency / Security / Crime prevention / Public safety

2008 Commonwealth of Virginia Information Security Report In keeping with our commitment to cost savings, this report was produced in limited quantities, in-house, utilizing an existing color printer and binding equipme

Add to Reading List

Source URL: www.vita.virginia.gov

Language: English - Date: 2011-10-12 16:16:32
327Internet privacy / Norwegian Official Report / Information privacy / Medical privacy / Telecommunications data retention / Surveillance / Privacy / Ethics / Security

’’Surveillance, Privacy and Security: A large scale participatory assessment of criteria and factors determining acceptability and acceptance of security technologies in Europe’’ Project acronym: SurPRISE Collabo

Add to Reading List

Source URL: d2dczhp6dhfxqb.cloudfront.net

Language: English - Date: 2015-02-20 12:58:54
328Identity / Social issues / Computer security / Security / Information privacy / Privacy-enhancing technologies / Data Protection Directive / Internet privacy / Personally identifiable information / Privacy / Ethics / Identity management

The ABC of ABC - An Analysis of Attribute-Based Credentials in the Light of Data Protection, Privacy and Identity -∗ Merel Koning1,3 , Paulan Korenhof2,3 , Gergely Alpár1 , and Jaap-Henk Hoepman1,3 1

Add to Reading List

Source URL: www.petsymposium.org

Language: English - Date: 2014-06-27 06:43:31
329Combinatorics / DIMACS / Secure multi-party computation / International Multilateral Partnership Against Cyber Threats / Computer security / Security / Secure communication / Mathematics

Efficient and Scalable Cybersecurity Using Algorithms Protected by Electricity (ESCAPE) CALL FOR PARTICIPATION DIMACS and IEEE Workshop The best cyber technologies provide strong guarantees on security and privacy proper

Add to Reading List

Source URL: dimacs.rutgers.edu

Language: English - Date: 2015-02-24 10:51:43
330Shavlik Technologies / Computer security / Data privacy / Electronic commerce / Electronic health record / Patch / Health Insurance Portability and Accountability Act / Personal digital assistant / Security / Computer network security / Health

Healthcare IT Solutions from Shavlik® SECURE I T OR LOSE I T Let’s face it. Today’s computing environment is a scary place. We’ve witnessed a rash of security breaches making headlines in retail. But seething unde

Add to Reading List

Source URL: rs.shavlik.com

Language: English - Date: 2015-03-31 13:16:02
UPDATE