Cloud computing security

Results: 3057



#Item
591Cloud infrastructure / Computer security / Security controls / Data center / IBM cloud computing / Kaavo / Cloud computing / Computing / Centralized computing

PDF Document

Add to Reading List

Source URL: www.algosec.com

Language: English - Date: 2014-10-07 08:01:23
592Cyberwarfare / Computer security / Application firewall / DMZ / Cloud computing / Payment Card Industry Data Security Standard / Denial-of-service attack / Computer network security / Computing / Electronic commerce

Guarding Your Web Systems CLOUD-DMZ ™ Web Systems Security A NEW, CLOUD-BASED ARCHITECTURE

Add to Reading List

Source URL: www.sentrix.com

Language: English - Date: 2015-03-03 05:40:24
593Privacy / Geosocial networking / Android software / Internet privacy / Location-based service / Social networking service / Cloud computing / Surveillance / Google Chrome / Software / Computing / Technology

Because we care: Privacy Dashboard on FirefoxOS Marta Piekarska Yun Zhou

Add to Reading List

Source URL: ieee-security.org

Language: English - Date: 2015-05-11 00:01:47
594Cloud storage / Government of India / Data center / Data management / Distributed data storage / Networks / Server / IBM Lotus Notes / Computer security / Computing / Concurrent computing / Distributed computing

Annexure-IV-A Details of State Data Centre available and recommended by the State/UT

Add to Reading List

Source URL: www.ncrb.gov.in

Language: English - Date: 2008-04-30 01:36:42
595Foresight / Transhumanism / Application firewall / Imperva / Cloud computing / Cyberwarfare / Futurology / Computing / Computer security

On the Radar: Foresight Web security out of the cloud Reference Code: IT022Publication Date: 23 May 2014 Author: Rik Turner

Add to Reading List

Source URL: www.sentrix.com

Language: English - Date: 2014-09-01 04:00:07
596Performance management / New Relic / Software-as-a-Service / Apdex / Security Assertion Markup Language / Dashboard / Cloud computing / Computing / Management / Software

Checklist New Relic APM Best Practices The Top 10 That Every Enterprise Needs to Know

Add to Reading List

Source URL: try.newrelic.com

Language: English - Date: 2015-05-01 14:57:23
597Computer architecture / Computer security / Companies listed on the New York Stock Exchange / Cloud computing / Intel / Trusted Execution Technology / AES instruction set / IBM cloud computing / McAfee VirusScan / Computing / Centralized computing / McAfee

PDF Document

Add to Reading List

Source URL: www.intel.de

Language: English - Date: 2014-04-03 20:38:13
598Proba-V / Proba / Shadow mask / The Mask: The Animated Series / GIO / Cloud computing / RGB color model / European Space Agency / Spaceflight / Global Monitoring for Environment and Security

GIO-GL Lot 1, GMES Initial Operations Date Issued: Issue: I2.00 Gio Global Land Component - Lot I ”Operation of the Global Land Component”

Add to Reading List

Source URL: land.copernicus.eu

Language: English - Date: 2015-03-23 06:31:05
599Education / Computer security / Application software / Information systems / Real-time computing / Software / Computer science / Cloud computing / Bachelor of Science in Information Technology / Computer science education / Security / Delft University of Technology

Faculty of Electrical Engineering, Mathematics and Computer Science MSc Programme Computer Science Track

Add to Reading List

Source URL: www.tudelft.nl

Language: English - Date: 2014-11-18 08:09:08
600Workflow technology / Groupware / Management / Workflow / Software as a service / Database / Azure Services Platform / Mobile business intelligence / ManyDesigns Portofino / Cloud computing / Computing / Centralized computing

Factonomy Resilience™ Enterprise Business Continuity and Compliance A solution to manage multi-standard compliance for Info-Security threat awareness.

Add to Reading List

Source URL: www.factonomy.com

Language: English - Date: 2013-07-22 13:34:04
UPDATE