Cloud computing security

Results: 3057



#Item
521Internet privacy / Patriot Act / Telephone tapping / Cryptography / Cloud computing security / Cloud communications / Cloud computing / Centralized computing / Computing

CLOUD COMPUTING AND THE PATRIOT ACT By Jonathan Gershater

Add to Reading List

Source URL: media.cloudbook.net

Language: English - Date: 2013-04-15 05:29:04
522Credit cards / Data privacy / Payment systems / Call centre / Interactive voice response / Computing / Payment Card Industry Data Security Standard / Electronic engineering / Cloud computing / Electronic commerce / Noble Systems Corporation / Computer law

S ERVICE B UREAU SUCCESS STORY

Add to Reading List

Source URL: www.noblesys.com

Language: English - Date: 2014-06-06 12:19:48
523Computer security / Computer network security / Cloud storage / Data center / Data management / Networks / McAfee / Infrastructure optimization / Network security / Computing / Concurrent computing / Cloud computing

Protecting the Data Center Solution Guide SECURITY CONNECTED

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-10 01:04:03
524Human rights / Computer network security / Crime prevention / National security / SCADA / Telemetry / Computer security / Cloud computing / Stuxnet / Technology / Security / Ethics

Future Research in Systems Security Evangelos Markatos and Davide Balzarotti⋆ , eds The SysSec Project Abstract. During its first year of operation, the SysSec network of excellence has creat

Add to Reading List

Source URL: www.syssec-project.eu

Language: English - Date: 2012-09-04 10:19:02
525Privacy / Internet privacy / Carrier cloud / Ethics / Computing / Cloud computing

Scientist’s perspective on security and privacy Andris Ambainis University of Latvia Software engineering is about ensuring that

Add to Reading List

Source URL: parleu2015.lv

Language: English - Date: 2015-04-21 01:54:54
526Computer crimes / Computer security / Malware / Vulnerability / Social engineering / Cloud computing / Phishing / Advanced persistent threat / Sotirios / Cybercrime / Computing / Cyberwarfare

Security and Privacy Research Challenges Sotiris Ioannidis Institute of Computer Science Foundation for Research and Technology - Hellas

Add to Reading List

Source URL: www.syssec-project.eu

Language: English - Date: 2014-11-07 15:06:11
527Cloud infrastructure / EMC Corporation / Safenet / Hyper-V / VMware / Virtual machine / IBM cloud computing / Eucalyptus / Cloud computing / System software / Software

ProtectV™ Data Protection for the Cloud PRODUCT BRiEF The security risks of virtualization

Add to Reading List

Source URL: www.edvance.com.hk

Language: English - Date: 2013-06-27 09:38:18
528Computer security / Cloud computing / Virtual private network / Computer network / Password / Client–server model / Wireless security / Remote desktop software / Computer network security / Computing / Security

Microsoft Word - REMOTE COMPUTING

Add to Reading List

Source URL: www.mpwa.co.uk

Language: English - Date: 2015-05-12 07:35:11
529Computer network security / Software / Cloud clients / Software testing / Malware / Mobile application development / IPhone / Rooting / Proprietary software / Computing / Smartphones / Computer security

Android / iPhone Risks and Solutions Part of the Reverse Engineering and Code Modification Prevention OWASP Project

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2014-01-29 15:31:05
530Calendaring software / Personal information managers / Groupware / Windows Server / Microsoft Office 365 / Microsoft SharePoint / Outlook Web App / Microsoft Exchange Server / Microsoft Outlook / Software / System software / Computing

Agenda MICROSOFT OFFICE 365 DEEP DIVE + CLOUD SECURITY: EXCHANGE, SHAREPOINT, LYNC “IN THE CLOUD”

Add to Reading List

Source URL: www.cco.com

Language: English - Date: 2015-01-06 19:11:20
UPDATE