Cloud computing security

Results: 3057



#Item
41Security / Computing / Prevention / Computer security / Crime prevention / Cryptography / Information governance / National security / Cloud computing security / European Network Exchange / Norbert Pohlmann / Data security

Day 1 (November:00 10:15 Registration Opening Morning Coffee

Add to Reading List

Source URL: www.isse.eu.com

Language: English - Date: 2015-11-09 09:09:16
42Computing / Computer access control / Smartphones / Cloud clients / Personal computing / Information appliances / Security token / Multi-factor authentication / Touchscreen / IPhone / Token / Android

Smartphones Editor: Roy Want n Google n Personal TouchIdentification Tokens Tam Vu and Marco Gruteser

Add to Reading List

Source URL: www.winlab.rutgers.edu

Language: English - Date: 2013-04-18 23:09:49
43Computing / Software development process / Cloud infrastructure / Agile software development / DevOps / Information technology management / Webroot / To The New / Cloud computing / Software testing / DevOps toolchain

Case Study | Security/Technology | Cloud Automation & Management SELF-SERVICE INFRASTRUCTURE DEVOPS Webroot delivers next-generation endpoint security and threat intelligence services to protect businesses and individua

Add to Reading List

Source URL: www.kovarus.com

Language: English - Date: 2016-07-11 19:38:57
44Computing / Wireless networking / Smartphones / IOS / Personal computing / Cloud clients / Wi-Fi / IPhone / Security token / Tablet computer / Wireless LAN / IPad

Initial Settings from smartphone  ■Initial Settings from Android smartphone/tablet PC  1. Turn on the Product  Insert the Product into a device (e.g. digital still camera) which is compatible

Add to Reading List

Source URL: www.toshiba.co.jp

Language: English - Date: 2013-07-31 22:51:17
45Computing / Cloud computing / Cloud infrastructure / Cloud computing security / OpenStack / Elasticity / VMware / Google Compute Engine / Cloud computing issues / IBM cloud computing

The State of Public Infrastructure-as-a-Service Cloud Security WEI HUANG, AFSHAR GANJALI, BEOM HEYN KIM, SUKWON OH, and DAVID LIE, University of Toronto The public Infrastructure-as-a-Service (IaaS) cloud industry has re

Add to Reading List

Source URL: www.eecg.toronto.edu

Language: English - Date: 2015-07-17 13:25:27
46Cryptography / Public-key cryptography / Attribute-based encryption / Encryption / ID-based encryption / Personal health record / RSA / Key / Cipher / Data Encryption Standard / Cloud computing security / Identity-based conditional proxy re-encryption

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2015-07-06 14:15:02
47Computing / Security / Networking hardware / Gateway / Videotelephony / Home automation / Computer security / Router / Access control / Cloud computing

Netvox_Inspire the Next Netvox IoT Office Solution Taiwan Head Office: No. 21-1, Chung - Hua West Rd. Tainan, Taiwan China Factory: Xiamen Torch High Technology Industrial Development Zone

Add to Reading List

Source URL: www.netvox.com.tw

Language: English - Date: 2016-07-21 22:28:14
48Computing / Cloud computing / Software / Cryptography / Copy protection / FlexNet Publisher / System administration / Internet of things / Flexera Software / Installation / Computer security / Software as a service

Flexible licensing, activation, delivery and full lifecycle management Amy Konary – Research Vice President - Software Licensing &

Add to Reading List

Source URL: media.flexerasoftware.com

Language: English - Date: 2015-03-19 18:40:46
49Computing / Security / Alarms / Perimeter security / Crime prevention / National security / Smartphones / Security alarm / Access control / Computer security / Gateway / Cloud computing

Netvox_Inspire the Next Netvox IoT Engine Room Solution Taiwan Head Office: No. 21-1, Chung - Hua West Rd. Tainan, Taiwan China Factory: Xiamen Torch High Technology Industrial Development Zone

Add to Reading List

Source URL: www.netvox.com.tw

Language: English - Date: 2016-07-21 22:39:11
50Computing / Software / Cloud clients / Internet privacy / Norton / Symantec / Malware / Medical privacy / Smartphone / Mobile app / Personal /  Inc. / Norton Internet Security

Norton Mobile Apps Survey Report December 2014 An alarming percentage of apps collect and send personally identifiable information (PII) to app developers. Newly released

Add to Reading List

Source URL: now.symassets.com

Language: English - Date: 2016-04-18 05:29:35
UPDATE