Cloud Computing Security

Results: 3057



#Item
961Cloud clients / Comodo Group / Comodo / Android / Tru / Comodo Internet Security / Software / Computing / Smartphones

COMODO ANTI-THEFT FOR ANDROID THIS AGREEMENT CONTAINS A BINDING ARBITRATION CLAUSE. PLEASE READ THE AGREEMENT CAREFULLY BEFORE ACCEPTING ITS TERMS AND CONDITIONS. IMPORTANT – PLEASE READ THESE TERMS CAREFULLY BEFORE US

Add to Reading List

Source URL: www.comodo.com

Language: English - Date: 2015-03-24 13:03:26
962Grid computing / Voms / Cloud infrastructure / Federated identity / OpenNebula / Shibboleth / Security Assertion Markup Language / Software / Computing / Free software

X.509 Authentication and Authorization in FermiCloud Hyunwoo KIM, Steven C TIMM, Fermilab Scientific Computing Division UCC(Utility/Cloud Computing), Cloud Federation Management London, 08 December 2014

Add to Reading List

Source URL: www.cloudfederationmanagement.org

Language: English - Date: 2014-12-11 02:46:56
963Digital media / Ambient intelligence / Internet of Things / Computer security / Password / Cloud computing / OWASP / Internet / Computer network security / Computing / Security

Report Internet of Things Research Study 2014 report

Add to Reading List

Source URL: www8.hp.com

Language: English
964Extensible Messaging and Presence Protocol / Online chat / Cloud computing / Gateway / Internet privacy / Computing / Network architecture / Cross-platform software

My Scale Just Told the Cloud I’m Fat Access Management, Security, Privacy and IOT Art Lancaster CTO, Affinegy

Add to Reading List

Source URL: events.linuxfoundation.org

Language: English - Date: 2015-03-24 14:04:15
965Computer security / Cloud computing security / Tokenization / Software as a service / Centralized computing / Cloud computing / Computing

FACT SHEET Cloud Gateway Protect sensitive information before it gets to the cloud. Protegrity Cloud Gateway makes it easy to leverage tokenization,

Add to Reading List

Source URL: www.protegrity.com

Language: English - Date: 2015-01-20 12:48:20
966Computing / Technology / Smartphones / Malware / Cloud computing

July 15, 2014 ITCS QUICK REFERENCE GUIDE: SMARTPHONE SECURITY GUIDE ECU Smartphone Security Guidelines Smartphones are being used for online purchases, credit card processing, email access, patient care, etc...

Add to Reading List

Source URL: www.ecu.edu

Language: English - Date: 2014-07-15 11:53:59
967Security information and event management / Cloud computing security / Cloud computing / Computer security / Computing / Data security

NFX FOR MSP SOLUTION BRIEF SP Monitor ™

Add to Reading List

Source URL: www.blackstratus.com

Language: English - Date: 2012-05-16 16:43:29
968Cloud applications / Electronic commerce / Web 2.0 / Google Apps / Collaboration / File hosting / Google / Payment Card Industry Data Security Standard / Customer relationship management / Cloud computing / Centralized computing / Computing

CUSTOMER SUCCESS STORY Multinational Hotels Company Enables Google Apps While Ensuring PCI Compliance with Google Apps and Netskope OVERVIEW

Add to Reading List

Source URL: www.netskope.com

Language: English - Date: 2015-04-10 13:27:48
969Legal aspects of computing / Computer security / Cloud computing security / Cloud communications / Cloud computing / Centralized computing / Computing

Premium Items_338788_LLane

Add to Reading List

Source URL: www.cyberlawcentre.org

Language: English - Date: 2014-04-24 05:17:41
970Cloud computing / Body area network / Privacy / Wireless sensor network / Computing / Wireless networking / Ethics / Technology

International Journal of Distributed Sensor Networks Special Issue on Security and Privacy in Cloud-Assisted IoT Networks CALL FOR PAPERS With recent advancements in networking technologies, some new emerging sensing

Add to Reading List

Source URL: downloads.hindawi.com

Language: English - Date: 2014-12-25 04:40:02
UPDATE