Cloud Computing Security

Results: 3057



#Item
361Ambient intelligence / Ubiquitous computing / Database / X Window System / Computer security / Cloud computing / Middleware / Software / Computing / Database management systems

System Support for Pervasive Applications ROBERT GRIMM New York University and JANET DAVIS, ERIC LEMAR, ADAM MACBETH, STEVEN SWANSON, THOMAS ANDERSON, BRIAN BERSHAD, GAETANO BORRIELLO,

Add to Reading List

Source URL: www.cs.nyu.edu

Language: English - Date: 2004-12-01 12:01:04
362Threat model / Cloud computing / Proprietary software / Threat / Asset / Platform as a service / Security / Computer security / Computing / Cyberwarfare

Threat Modeling Cloud Applications What You Don’t Know Will Hurt You Scott Matsumoto

Add to Reading List

Source URL: 2011.appsecusa.org

Language: English - Date: 2011-09-26 16:03:44
363Computer security / Application firewall / Malware / Cloud computing / Payment Card Industry Data Security Standard / Qualys / SecurityMetrics / Antivirus software / System software / Computing

The Company SiteLock is the global leader in website security, providing cloud-based technology and expert website repair services designed to keep online businesses safe. With more than 1,000,000 online businesses prote

Add to Reading List

Source URL: www.sitelock.com

Language: English - Date: 2014-07-24 01:22:03
364Computing / Crime prevention / National security / Computer network security / Information technology management / Cloud computing / Application security / Data security / Payment Card Industry Data Security Standard / Security / Computer security / Electronic commerce

  Security Policy LearnSprout Products & Services  

Add to Reading List

Source URL: learnsprout-static.s3.amazonaws.com

Language: English - Date: 2014-12-23 18:35:24
365National security / Human rights / Public safety / Computer network security / Science and Technology Options Assessment / Internet privacy / Open-source software / Cloud computing / Computer security / Security / Ethics / Crime prevention

Mass Surveillance Mass Surveillance What are the risks for citizens and the opportunities for the European Information Society? What are the possible mitigation strategies?

Add to Reading List

Source URL: www.europarl.europa.eu

Language: English - Date: 2015-02-12 15:10:03
366Cloud infrastructure / Hadoop / Apache Hadoop / Parallel computing / Emerging technologies / MapR / Big data / Data Intensive Computing / Computing / Cloud computing / Concurrent computing

Hadoop Data Access on Your Terms™ BlueTalon Solution Brief Are Data Access and Security Issues Slowing Your Adoption of Hadoop?

Add to Reading List

Source URL: bluetalon.com

Language: English - Date: 2015-06-08 21:23:04
367Security / Federated identity / Telecommunications / Federated identity management / Cloud computing / Single sign-on / Provisioning / Web Access Management / Anakam / Computer security / Identity management / System software

People-Focused Access Management Software Consulting Support Services

Add to Reading List

Source URL: pirean.com

Language: English - Date: 2014-08-15 11:57:37
368Crime prevention / National security / Computing / Public safety / Data security / Penetration test / Information security / Cloud computing security / Cloud computing / Security / Computer security / Computer network security

TECHNICAL LEVEL DESIGNATIONS CONFERENCE AT-A-GLANCE Wednesday, March 25

Add to Reading List

Source URL: www.infosec-world.com

Language: English - Date: 2015-02-06 12:03:44
369Internet / Cloud computing / Computer security / Echoworx / Email / Computing / Security

G-Cloud – Encrypted Email Delivering point to point email encryption from the cloud A simple to use system that makes your private mail private The demand for Government to be able to communicate and exchange informati

Add to Reading List

Source URL: www.scc.com

Language: English - Date: 2015-04-24 05:46:05
370Cross-site scripting / SQL injection / Plug-in / JavaScript / Application security / Cloud computing / Cross-site request forgery / ArcSight / Computing / Cyberwarfare / Computer security

PREVOTY RUNTIME APPLICATION SECURITY Applications, and the databases that they access, are at the heart of most enterprises business and hackers know that’s where the money is, including usernames, passwords, personal

Add to Reading List

Source URL: prevoty.com

Language: English - Date: 2015-06-04 23:45:18
UPDATE