Cloud computing security

Results: 3057



#Item
41Day 1 (November:00 10:15 Registration Opening Morning Coffee

Day 1 (November:00 10:15 Registration Opening Morning Coffee

Add to Reading List

Source URL: www.isse.eu.com

Language: English - Date: 2015-11-09 09:09:16
42Smartphones Editor: Roy Want n Google n  Personal TouchIdentification Tokens Tam Vu and Marco Gruteser

Smartphones Editor: Roy Want n Google n Personal TouchIdentification Tokens Tam Vu and Marco Gruteser

Add to Reading List

Source URL: www.winlab.rutgers.edu

Language: English - Date: 2013-04-18 23:09:49
43Case Study | Security/Technology | Cloud Automation & Management  SELF-SERVICE INFRASTRUCTURE DEVOPS Webroot delivers next-generation endpoint security and threat intelligence services to protect businesses and individua

Case Study | Security/Technology | Cloud Automation & Management SELF-SERVICE INFRASTRUCTURE DEVOPS Webroot delivers next-generation endpoint security and threat intelligence services to protect businesses and individua

Add to Reading List

Source URL: www.kovarus.com

Language: English - Date: 2016-07-11 19:38:57
44Initial Settings from smartphone  ■Initial Settings from Android smartphone/tablet PC  1. Turn on the Product  Insert the Product into a device (e.g. digital still camera) which is compatible

Initial Settings from smartphone  ■Initial Settings from Android smartphone/tablet PC  1. Turn on the Product  Insert the Product into a device (e.g. digital still camera) which is compatible

Add to Reading List

Source URL: www.toshiba.co.jp

Language: English - Date: 2013-07-31 22:51:17
45The State of Public Infrastructure-as-a-Service Cloud Security WEI HUANG, AFSHAR GANJALI, BEOM HEYN KIM, SUKWON OH, and DAVID LIE, University of Toronto The public Infrastructure-as-a-Service (IaaS) cloud industry has re

The State of Public Infrastructure-as-a-Service Cloud Security WEI HUANG, AFSHAR GANJALI, BEOM HEYN KIM, SUKWON OH, and DAVID LIE, University of Toronto The public Infrastructure-as-a-Service (IaaS) cloud industry has re

Add to Reading List

Source URL: www.eecg.toronto.edu

Language: English - Date: 2015-07-17 13:25:27
46ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2015-07-06 14:15:02
47Netvox_Inspire the Next  Netvox IoT Office Solution Taiwan Head Office: No. 21-1, Chung - Hua West Rd. Tainan, Taiwan China Factory: Xiamen Torch High Technology Industrial Development Zone

Netvox_Inspire the Next Netvox IoT Office Solution Taiwan Head Office: No. 21-1, Chung - Hua West Rd. Tainan, Taiwan China Factory: Xiamen Torch High Technology Industrial Development Zone

Add to Reading List

Source URL: www.netvox.com.tw

Language: English - Date: 2016-07-21 22:28:14
48Flexible licensing, activation, delivery and full lifecycle management  Amy Konary – Research Vice President - Software Licensing &

Flexible licensing, activation, delivery and full lifecycle management Amy Konary – Research Vice President - Software Licensing &

Add to Reading List

Source URL: media.flexerasoftware.com

Language: English - Date: 2015-03-19 18:40:46
49Netvox_Inspire the Next  Netvox IoT Engine Room Solution Taiwan Head Office: No. 21-1, Chung - Hua West Rd. Tainan, Taiwan China Factory: Xiamen Torch High Technology Industrial Development Zone

Netvox_Inspire the Next Netvox IoT Engine Room Solution Taiwan Head Office: No. 21-1, Chung - Hua West Rd. Tainan, Taiwan China Factory: Xiamen Torch High Technology Industrial Development Zone

Add to Reading List

Source URL: www.netvox.com.tw

Language: English - Date: 2016-07-21 22:39:11
50Norton Mobile Apps Survey Report December 2014 An alarming percentage of apps collect and send personally identifiable information (PII) to app developers. Newly released

Norton Mobile Apps Survey Report December 2014 An alarming percentage of apps collect and send personally identifiable information (PII) to app developers. Newly released

Add to Reading List

Source URL: now.symassets.com

Language: English - Date: 2016-04-18 05:29:35