Cloud computing security

Results: 3057



#Item
511  Auditing Distributed Databases A new paradigm is among us beyond the “Cloud” or mobile devices, and that is with the use of Distributed Database Systems (DDS). Though they have been around for the better part of a

1 Auditing Distributed Databases A new paradigm is among us beyond the “Cloud” or mobile devices, and that is with the use of Distributed Database Systems (DDS). Though they have been around for the better part of a

Add to Reading List

Source URL: cloudsecurityalliance.org

Language: English - Date: 2015-04-27 14:00:07
52Security Guide  Zoom Video Communications Inc. Zoom unifies cloud video conferencing, simple online meetings, group messaging, and a softwaredefined conference room solution into one easy-to-use platform. Zoom offers the

Security Guide Zoom Video Communications Inc. Zoom unifies cloud video conferencing, simple online meetings, group messaging, and a softwaredefined conference room solution into one easy-to-use platform. Zoom offers the

Add to Reading List

Source URL: d24cgw3uvb9a9h.cloudfront.net

Language: English - Date: 2016-08-08 05:14:20
53ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2015-06-18 08:40:52
54Data center & Cloud Security Ravi Varanasi General Manager of Data Center Security Products Group, Intel Corporation

Data center & Cloud Security Ravi Varanasi General Manager of Data Center Security Products Group, Intel Corporation

Add to Reading List

Source URL: www.whd.global

Language: English - Date: 2016-03-30 07:46:39
55ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Monthly Peer Reviewed Open Access International e-Journal

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Monthly Peer Reviewed Open Access International e-Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2014-12-12 08:36:52
56Advanced Exploitation: Xen Hypervisor VM Escape Shangcong Luan May 27, 2016 Alibaba Cloud Platform Security Team

Advanced Exploitation: Xen Hypervisor VM Escape Shangcong Luan May 27, 2016 Alibaba Cloud Platform Security Team

Add to Reading List

Source URL: conference.hitb.org

Language: English - Date: 2016-05-27 10:02:21
57Distributed Independent Competitor Analysis and Access to Databases Encrypted Cloud Srikanth Bathini M.Tech, Dept of Computer Science Engineering, Prasad College of Engineering.

Distributed Independent Competitor Analysis and Access to Databases Encrypted Cloud Srikanth Bathini M.Tech, Dept of Computer Science Engineering, Prasad College of Engineering.

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2016-08-04 01:33:45
58CoCo_Cloud Presentation DPSP cluster Napoli

CoCo_Cloud Presentation DPSP cluster Napoli

Add to Reading List

Source URL: eucloudclusters.files.wordpress.com

Language: English - Date: 2016-03-07 06:09:15
59NETEVENTS  APAC PRESS & ANALYST SUMMIT First Draft Debate II: Protecting the Enterprise Means Protecting the Cloud

NETEVENTS APAC PRESS & ANALYST SUMMIT First Draft Debate II: Protecting the Enterprise Means Protecting the Cloud

Add to Reading List

Source URL: www.netevents.org

Language: English - Date: 2016-05-27 05:15:32
60Fortinet Security Fabric White Paper

Fortinet Security Fabric White Paper

Add to Reading List

Source URL: www.ciosummits.com

Language: English - Date: 2016-08-02 16:38:44