Cloud computing security

Results: 3057



#Item
131Cloud infrastructure / Data management / Cloud storage / Data centers / Computer networking / Cloud computing / Infrastructure optimization / Provisioning / Storage area network / Computer security / Dynamic infrastructure / IBM cloud computing

Data Center arrow.com The data center. Few people ever see it, but precious little of consequence happens without passing through it.

Add to Reading List

Source URL: www.fiveyearsout.com

Language: English - Date: 2016-08-12 12:28:45
132Cloud computing / Cloud infrastructure / Cloud Security Alliance / Service-level agreement / Disaster recovery / IBM cloud computing / Cloud computing issues

Practical Guide to Cloud Service Agreements, Version 2.0 http://cloud-council.org/resource-hub.htm#practical-guide-to-cloud-serviceagreements-version-2 April, 2015 The Cloud Standards Customer Council

Add to Reading List

Source URL: www.cloud-council.org

Language: English - Date: 2016-08-12 16:57:54
133Videotelephony / Data management / Ambient intelligence / Internet of things / Big data / Gateway / Computer security / Cisco Systems / Analytics / Cloud computing / Jasper Technologies / Industrial Internet Consortium

THE INTERNET OF THE FUTURE White Paper Introduction: Why an Internet of Things?

Add to Reading List

Source URL: www.mahindra.com

Language: English - Date: 2016-02-19 02:32:47
134Cloud computing / Cloud infrastructure / Standards organizations / Object Management Group / Unified Modeling Language / Service-level agreement / Cloud computing security / Computer security

Cloud Standards Customer Council Forms Security Working Group and Initiates Work on Service Level Agreement Guidance Document

Add to Reading List

Source URL: www.cloud-council.org

Language: English - Date: 2016-05-20 10:34:38
135Computer network security / Network architecture / Computer security / Cloud computing / Cloud infrastructure / Virtual LAN / Virtual private network / Zscaler / Wireless security

AppGate-Context-Aware-Dynmic-Access-Infographic-rev6-15

Add to Reading List

Source URL: www.cryptzone.com

Language: English - Date: 2016-02-24 15:29:34
136Cloud infrastructure / Cloud computing / Personal /  Inc. / Computer security / Cloud computing security / Zscaler

Asian Business woman using an iPad

Add to Reading List

Source URL: downloads.cloudsecurityalliance.org

Language: English - Date: 2016-01-25 16:10:03
137Cloud computing / Computer security / Computer access control / Computer network security / Virtual private cloud / Cloud computing security / Authentication / Internet security / Privileged identity management

denial-of-service spoofing application delivery controller (ADC)

Add to Reading List

Source URL: cloudschool.com

Language: English - Date: 2016-06-06 17:05:54
138Cryptography / Computer network / Telecommunications engineering / Database / Computing / Application software / Cloud computing / Operating system / Personal computer / Computer science / Computer security / Mainframe computer

DSST EXAM CONTENT FACT SHEET DSST® COMPUTING AND INFORMATION TECHNOLOGY EXAM INFORMATION This exam was developed to enable schools to award credit to students for knowledge equivalent to that

Add to Reading List

Source URL: getcollegecredit.com

Language: English - Date: 2016-07-06 09:01:13
139Computer network security / Crime prevention / Cryptography / Information governance / National security / Acceptable use policy / Internet privacy / Computer security / Information privacy / Privacy / Privacy concerns with social networking services / Cloud computing security

Acceptable Use Policy for Wadham IT General Rules 1. All individuals wishing to make use of Wadham College IT facilities must abide by this document. Wadham IT facilities include networking, shared IT facilities such as

Add to Reading List

Source URL: www.wadham.ox.ac.uk

Language: English - Date: 2013-08-21 07:05:29
140Cloud storage / Cloud infrastructure / Outsourcing / Cloud computing / Distributed file system for cloud / Cloud storage gateway

Microsoft PowerPoint - 禹勇

Add to Reading List

Source URL: security-lab.jaist.ac.jp

Language: English - Date: 2015-11-22 02:25:26
UPDATE