Cloud Computing Security

Results: 3057



#Item
311

Round Table Report 1 April 2015, Brussels Round Table Report The role of encryption in cloud computing for data privacy and security

Add to Reading List

Source URL: www.openforumeurope.org

Language: English
    312

    2014 IEEE Security and Privacy Workshops Improving Hard Disk Contention-based Covert Channel in Cloud Computing Environment Bartosz Lipiński, Wojciech Mazurczyk, Krzysztof Szczypiorski Warsaw University of Technology,

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2014-04-30 03:11:29
      313

      2014 IEEE Security and Privacy Workshops Improving Hard Disk Contention-based Covert Channel in Cloud Computing Environment Bartosz Lipiński, Wojciech Mazurczyk, Krzysztof Szczypiorski Warsaw University of Technology,

      Add to Reading List

      Source URL: ieee-security.org

      Language: English - Date: 2014-04-30 03:11:29
        314Web hosting / Cloud infrastructure / Rackspace / Computer security / Application firewall / Cloud storage / Rackspace Cloud / Cloud communications / Cloud computing / Centralized computing / Computing

        How to Bring Shadow IT into the Light 8 Steps Along the Path Contents

        Add to Reading List

        Source URL: c1776742.cdn.cloudfiles.rackspacecloud.com

        Language: English - Date: 2014-09-30 09:13:10
        315Information privacy / Telecommunications data retention / Data Protection Directive / IICCRD / Cloud backup / Cloud computing / Centralized computing / Computing

        Privacy and Security Law Report ® Reproduced with permission from Privacy & Security Law Report, 11 PVLR 1130, Copyright 姝 2012 by The Bureau of National Affairs, Inchttp://www.bna.com

        Add to Reading List

        Source URL: www.itlawgroup.com

        Language: English - Date: 2013-06-09 16:10:44
        316Health Insurance Portability and Accountability Act / Computer security / Law / Computing / Security / Password / Cloud computing

        UCLA  Data  Use  Policy  for  the  IDRE  Cloud  Archival  Storage  Service   Faculty  and  staff  use  of  cloud  storage  services  offered  by  UCLA  

        Add to Reading List

        Source URL: cloud.ucla.edu

        Language: English - Date: 2014-03-03 19:06:52
        317System software / System administration / Remote administration software / Mobile computers / Cloud computing / Remote administration / Citrix Systems / Security / Personal digital assistant / Computing / Centralized computing / Remote desktop

        Complete mobile data security Any device Any me Anywhere

        Add to Reading List

        Source URL: www.exacttrak.com

        Language: English - Date: 2015-04-20 14:06:42
        318Mobile technology / Mobile telecommunications / Mobile commerce / Consumerization / Mobile phone / API Management / Cloud computing / Smartphone / Payment Card Industry Data Security Standard / Technology / Electronic commerce / Payment systems

        The Consumerization of Retail Securing Payments with APIs The 21st century has brought a paradigm shift to retail—no longer were traditional brick and mortar and mail-order catalogs good enough. Retail was forced to su

        Add to Reading List

        Source URL: www.ca.com

        Language: English - Date: 2015-02-03 10:29:45
        319Zmanda Recovery Manager / Backup software / Data security / IBM Tivoli Storage Manager / Cloud storage / Zmanda / MySQL / Advanced Maryland Automatic Network Disk Archiver / Backup / System software / Computing / Software

        MySQL Backup for Tivoli Storage Manager

        Add to Reading List

        Source URL: www.zmanda.com

        Language: English - Date: 2010-02-19 02:30:50
        320Computer security / Crime prevention / National security / Secure communication / Cyber-security regulation / Cloud computing / Computing / International Cybercrime / Cyberwarfare / Security / Computer network security

        STUMBLING BLOCKS IN THE PATH TO TRUE SECURITY Some governments today are invoking cybersecurity as a justification for a variety of policies that go beyond what is needed to address legitimate security concerns. In fact,

        Add to Reading List

        Source URL: cybersecurity.bsa.org

        Language: English - Date: 2015-03-06 14:56:48
        UPDATE