Cloud Computing Security

Results: 3057



#Item
291Computer network security / IEEE 802 / Computer networking / Packet Processing / Deep packet inspection / Quality of service / Cloud computing / WiMAX / System Architecture Evolution / System software / Computing / Electronic engineering

White Paper Virtualisation in Telecoms Networks Intel® Architecture Processors Networking and Communications Realising the Benefits of Network

Add to Reading List

Source URL: www.intel.de

Language: English - Date: 2014-03-04 14:05:00
292Privacy / Security / Identity management / Social issues / Policy / Privacy policy / University of California / Cloud computing / Information security / Association of Public and Land-Grant Universities / Ethics / Computing

UC SANTA BARBARA POLICY AND PROCEDURE Guidelines Concerning Click-Through Agreements Contact: Policy Office - Administrative Services; Information Security - Enterprise Technology Services; Procurement Services - Adminis

Add to Reading List

Source URL: www.policy.ucsb.edu

Language: English - Date: 2015-06-10 20:22:42
293Software / Remote backup service / Backup / Cloud backup / Replication / Continuous data protection / Cloud computing / RMAN / NetVault Backup / Backup software / Computing / Data security

Comprehensive Agentless Cloud Backup and Recovery Software for the Enterprise Asigra, Inc.

Add to Reading List

Source URL: www.asigra.com

Language: English - Date: 2015-03-23 15:57:53
294Computer network security / IEEE 802 / Computer networking / Packet Processing / Deep packet inspection / Quality of service / Cloud computing / WiMAX / System Architecture Evolution / System software / Computing / Electronic engineering

White Paper Virtualisation in Telecoms Networks Intel® Architecture Processors Networking and Communications Realising the Benefits of Network

Add to Reading List

Source URL: www.intel.nl

Language: English - Date: 2014-03-02 05:22:49
295

Soha Cloud: Instant Application Security for Enterprise Cloud Computing Environments The Soha Cloud creates a highly secure perimeter around your cloud applications protecting them from breaches, loss, and hijacking, whi

Add to Reading List

Source URL: soha.io

Language: English - Date: 2015-05-22 02:50:04
    296Computer network security / IEEE 802 / Computer networking / Packet Processing / Deep packet inspection / Quality of service / Cloud computing / WiMAX / System Architecture Evolution / System software / Computing / Electronic engineering

    White Paper Virtualisation in Telecoms Networks Intel® Architecture Processors Networking and Communications Realising the Benefits of Network

    Add to Reading List

    Source URL: www.intel.eu

    Language: English - Date: 2014-03-03 12:50:49
    297Copyright law / Cryptography / Trusted Computing / Database / Computer security / Cloud computing / Security / Computing / Business law

    Poster: Forcing the Cloud to Forget by Attesting Data Deletion Michael Backes Fabian Bendun

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2015-05-11 16:42:40
    298Computer network security / Computing / Crime prevention / National security / Information security / Telecommunications data retention / Password / Cloud computing security / Cloud computing / Security / Computer security / Data security

    logo-projectplace-by-planview-333

    Add to Reading List

    Source URL: www.projectplace.com

    Language: English - Date: 2015-05-08 05:33:38
    299Cloud applications / Data synchronization / File hosting / Crime prevention / National security / Dropbox / Computer security / Data security / Computer file / Computing / Software / Cloud computing

    Financial Services Use Case Secure, auditable file sharing everywhere it counts To grow and sustain profitability in an era of low interest rates and disruptive

    Add to Reading List

    Source URL: essentials.code42.com

    Language: English - Date: 2015-07-18 14:40:29
    UPDATE