Cloud computing security

Results: 3057



#Item
321Security / Trusted Network Connect / Trusted Platform Module / Cloud computing / Infrastructure / Computer security / Trusted computing / Computer network security

PDF Document

Add to Reading List

Source URL: www.trustedcomputinggroup.org

Language: English - Date: 2010-09-13 09:37:20
322Computer security / Public safety / Data security / Cloud computing / Information security / Security / Crime prevention / National security

{agency logo} {Insert Date} {Cloud System Owner Name} {Insert Cloud Service Name} Cloud System Owner

Add to Reading List

Source URL: fedramp.sites.usa.gov

Language: English - Date: 2015-03-05 15:59:41
323Public safety / Computer network security / Electronic commerce / Crime prevention / National security / Information security / Password / Cloud computing security / Access control / Security / Computer security / Cyberwarfare

Access Security Requirements

Add to Reading List

Source URL: checkpointscreening.com

Language: English - Date: 2015-03-09 19:01:58
324Software distribution / Software as a service / Software industry / Chief information officer / Workday /  Inc. / Cloud computing security / IICCRD / Cloud computing / Computing / Centralized computing

10 Critical Requirements for Cloud Applications How to Recognize Cloud Providers and Applications that Deliver Real Value 1 10 Critical Requirements for Cloud Applications

Add to Reading List

Source URL: www.ciosummits.com

Language: English - Date: 2015-04-20 12:23:43
325Software / API Management / OAuth / Cloud computing / Windows Vista / Cloud API / Generic Security Services Application Program Interface / Computing / Application programming interfaces / Centralized computing

API Security: A Guide To Securing Your Digital Channels © Akana, All Rights Reserved | Contact Us | Privacy Policy

Add to Reading List

Source URL: www.ciosummits.com

Language: English - Date: 2015-03-18 11:23:36
326Computer network security / Cyberwarfare / National security / Information security management system / Information security / IT risk / Cloud computing security / Threat / IT risk management / Computer security / Security / Data security

Intelligent Security: Defending the Digital Business 2 Intelligent Security: Defending the Digital Business

Add to Reading List

Source URL: www.accenture.com

Language: English - Date: 2015-01-22 09:55:39
327Cloud infrastructure / Trusted computing / Semiconductor companies / Server hardware / IBM cloud computing / Trusted Execution Technology / Intel / Trusted Computing Group / IBM System x / Cloud computing / Computing / Computer security

Vendor Spotlight OCTOBER 2012 IBM Offers Cloud Security for a Smarter Planet

Add to Reading List

Source URL: www.intel.com

Language: English - Date: 2015-01-09 15:28:45
328Cloud clients / Embedded Linux / Android / Computer security / Android software development / Mobile application development / Google Chrome / Bring your own device / Virtual machine / Software / Computing / Smartphones

Enabling BYOD through Secure Meta-Market ∗ Alessandro Armando

Add to Reading List

Source URL: www.csec.it

Language: English - Date: 2014-08-26 05:34:09
329Data security / Computer network security / Computer security / Public safety / Information security / Internet privacy / Cloud computing / NIST Special Publication 800-53 / Department of Defense Strategy for Operating in Cyberspace / Security / Crime prevention / National security

How TMT organizations perceive their security 88% 68%

Add to Reading List

Source URL: deloitte.wsj.com

Language: English
330Computer security / Access control / Identity management / Operating system / Kernel / Ring / Android / Malware / Google Chrome / Software / Computing / Cloud clients

User-Driven Access Control: Rethinking Permission Granting in Modern Operating Systems

Add to Reading List

Source URL: ieee-security.org

Language: English - Date: 2012-05-22 01:33:56
UPDATE