Cloud Computing Security

Results: 3057



#Item
851Internet privacy / Network architecture / Computer architecture / Mobile device management / Cloud computing / Virtual private network / Network security / Mobile business intelligence / IBM cloud computing / Computer network security / Computing / Centralized computing

zscaler-security-cloud-ebook

Add to Reading List

Source URL: www.zscaler.com

Language: English - Date: 2015-04-01 12:38:28
852OAuth / Security / Computer security / Cross-platform software / Web 2.0 / Gmail / Identity management / Authentication / Twitter / Computing / Cloud standards / Internet protocols

www.computer.org/internet computing OAuth Web Authorization Protocol Barry Leiba Vol. 16, No. 1

Add to Reading List

Source URL: internetmessagingtechnology.org

Language: English - Date: 2012-03-08 10:27:55
853System software / Web services / Identity management / Identity management systems / WS-SecurityPolicy / WS-Security / Security Assertion Markup Language / WS-SecureConversation / WS-Trust / Computing / Security / Computer security

CLouD CoMPuTing Interoperable Security Standards for Web Services Sitaraman Lakshminarayanan, GE Energy

Add to Reading List

Source URL: www.computer.org

Language: English - Date: 2012-02-29 13:44:33
854VMware / Internet protocols / IPv6 / Cloud computing / Domain Name System Security Extensions / System administrator / Large Installation System Administration Conference / Tom Limoncelli / VCloud / Computing / Software / Network architecture

Register by November 19 and SAVE! Techniques

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2014-02-27 22:49:53
855Cloud computing / Common Criteria / Cloud infrastructure / Centralized computing / Computing / Computer security

Microsoft PowerPoint - 07_Assurance - Alex.pptx

Add to Reading List

Source URL: www.buildingtrustincloud.org

Language: English - Date: 2014-10-09 07:32:10
856Public safety / Management / Risk management / Computer network security / Security controls / Information security / Cloud computing / Government procurement in the United States / Risk management framework / Security / Computer security / Data security

Click to edit Master title style Federal Risk and Authorization Management Program An Interagency Program Pete Tseronis Cloud Computing Advisory Council, Chair

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2010-05-25 01:00:00
857Computer network security / Crime prevention / National security / Software testing / Computer security / Vulnerability / Data center / Computing / Cloud computing / Concurrent computing

High Assurance in Multi-Layer Cloud Infrastructures Aleksandar 1 Hudic ,

Add to Reading List

Source URL: www.buildingtrustincloud.org

Language: English - Date: 2014-10-09 07:27:43
858Security / Malware / Vulnerability / Threat / Computer insecurity / Zero-day attack / Attack / Database security / Cloud computing / Computer network security / Cyberwarfare / Computer security

TOP 10 where Security-OBLIGATED Executives should focus Introduction

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-21 02:20:33
859Computer network security / OpenVPN / Cloud computing / Apache Cassandra / MySQL / Vertica / Rackspace / Amazon.com / Virtual private network / Computing / Data management / Software

Pythian Client Case Study CLIENT TinyCo INDUSTRY Entertainment/Media

Add to Reading List

Source URL: www.pythian.com

Language: English - Date: 2015-03-20 10:08:56
860Computer network security / Cloud computing / Credit cards / Data privacy / Cloud computing security / Managed security service / HITRUST / Regulatory compliance / Payment Card Industry Data Security Standard / Computer security / Computing / Security

Solutionary provides security and compliance platform Analyst: Rick Kurtzbein 4 Oct, 2012 As readers of the Daily T1R know, we just held our annual Hosting and Cloud Transformation

Add to Reading List

Source URL: www.solutionary.com

Language: English - Date: 2013-05-06 14:36:12
UPDATE