Cloud Computing Security

Results: 3057



#Item
481Cloud storage / Government of India / Data center / Data management / Distributed data storage / Networks / Server / IBM Lotus Notes / Computer security / Computing / Concurrent computing / Distributed computing

Annexure-IV-A Details of State Data Centre available and recommended by the State/UT

Add to Reading List

Source URL: ncrb.nic.in

Language: English - Date: 2008-04-30 01:36:42
482Computer architecture / Android / Antivirus software / Embedded Linux / Cloud clients / Android Market / Malware / Microsoft Security Essentials / Mobile virus / Software / Smartphones / Computing

On Lightweight Mobile Phone Application Certification∗ † William Enck, Machigar Ongtang, and Patrick McDaniel Systems and Internet Infrastructure Security Laboratory Department of Computer Science and Engineering The

Add to Reading List

Source URL: www.enck.org

Language: English
483Cloud computing / Akamai Technologies / Content delivery network / Cloud storage / File sharing / Peercasting / Application firewall / Application security / Computing / Concurrent computing / Computer security

AKAMAI CLOUD SECURITY SOLUTIONS: PRODUCT BRIEF Kona Client Reputation Client Reputation data is used to improve security decisions. Billions of IP addresses interact with the Akamai Intelligent Platform every month. The

Add to Reading List

Source URL: www.akamai.de

Language: English - Date: 2015-04-08 06:50:03
484Cloud standards / Application programming interfaces / API Management / OAuth / Representational state transfer / Cloud API / Google App Engine / Cloud computing / Computing / Centralized computing

API Gateways: Where Security Enables Innovation Version 1.0 Released: September 5, 2013

Add to Reading List

Source URL: securosis.com

Language: English - Date: 2013-09-21 16:34:51
485Software / Cloud computing / Identity management / Software as a service / Shibboleth / Single sign-on / Federated identity / Computing / Computer security

Fischer Federated SSO HigherEd_MCB-10-731C_front

Add to Reading List

Source URL: www.fischerinternational.com

Language: English - Date: 2012-06-13 12:03:43
486Smartphones / Spamming / Computer network security / Software / Android / Botnet / Computing / Malware / Cloud clients

Droid Exploitation Saga WhitePaper [BLACKHAT – ABU DHABI]

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2012-12-06 13:00:57
487Identity management / System software / Shibboleth / Computer security / Internet2 / Password / Security Assertion Markup Language / Kuali Foundation / Cloud computing / Federated identity / Computing / Identity management systems

Ignite IT to Drive Higher Education TM

Add to Reading List

Source URL: www.fischerinternational.com

Language: English - Date: 2013-04-09 10:36:22
488National security / Public safety / Computer security / Information security / Backup / Internet privacy / Audit trail / Vulnerability / Cloud computing security / Security / Data security / Crime prevention

Privacy Impact Assessment

Add to Reading List

Source URL: cio.noaa.gov

Language: English - Date: 2013-08-29 09:51:39
489Cloud computing security / IBM cloud computing / Centralized computing / Cloud computing / Computing

Information at all.net05b http://all.net/

Add to Reading List

Source URL: all.net

Language: English - Date: 2013-07-10 14:08:04
490Antivirus software / Computer network security / Malware / Cyberwarfare / Software / Cloud clients / Threat / Android / Computer virus / Smartphones / Computing / Computer security

AppContext: Differentiating Malicious and Benign Mobile App Behaviors Using Context Wei Yang∗ , Xusheng Xiao† , Benjamin Andow‡ , Sihan Li∗ , Tao Xie∗ , William Enck‡ ∗ Department of Computer Science, Univ

Add to Reading List

Source URL: www.enck.org

Language: English
UPDATE