Cloud computing security

Results: 3057



#Item
621Secure communication / Internet / Data / Internet protocols / Internet standards / Transport Layer Security / Security Assertion Markup Language / Password / SAML 2.0 / Computing / Teleconferencing / Cryptographic protocols

Zoom Security White Paper May 2013 Zoom offers the first Unified Meeting Experience (UMX), a cloud service that provides a 3-in-1 meeting platform with HD video conferencing, mobility and web meetings. UMX also offers th

Add to Reading List

Source URL: d24cgw3uvb9a9h.cloudfront.net

Language: English - Date: 2015-04-13 09:04:08
622Cloud storage / Data center / Cloud computing security / Cloud computing / Computing / Concurrent computing

The Cloud is Only as Secure as its Provider: What to Know Before You Migrate By Lauren Gibbons Paul One of IT’s biggest balancing acts is to make data transactions easily available to authorized users while preventing

Add to Reading List

Source URL: www.qtsdatacenters.com

Language: English - Date: 2014-04-24 15:24:00
623Data security / Computer network security / Crime prevention / National security / Cloud computing / Information security / Security controls / Health Insurance Portability and Accountability Act / Regulatory compliance / Security / Computing / Computer security

WHITEPAPER Keeping Genomic Data Safe on the Cloud Cloud computing is a powerful tool to deal with the exponential growth of storage and processing requirements of genomic data. However, cloud computing also raises conce

Add to Reading List

Source URL: www.sbgenomics.com

Language: English - Date: 2015-03-06 08:25:24
624Cloud computing / Computer security / Hacker / Internet privacy / Antivirus software / International Cybercrime / Wireless security / Computing / Computer network security / Security

Microsoft Word - 70444994_article critiqe-good

Add to Reading List

Source URL: www.bestessays.com

Language: English - Date: 2014-01-14 10:26:30
625Computer security / Computer network security / Crime prevention / National security / Software as a service / OpenNebula / Information security / Hypervisor / Security controls / Computing / Cloud computing / Centralized computing

Performance analysis of OFDM modulation on indoor broadband PLC channels

Add to Reading List

Source URL: www.journalofcloudcomputing.com

Language: English
626Computer security / Computer law / Credit cards / Payment systems / Health Insurance Portability and Accountability Act / Payment Card Industry Data Security Standard / Cloud computing security / Cloud computing / Regulatory compliance / Data privacy / Computing / Law

HOSTING Guide to HIPAA Compliant Solutions in the Cloud Most healthcare organizations find that meeting Health Insurance Portability and Accountability Act ofHIPAA) and Health Information Technology for Economic a

Add to Reading List

Source URL: www.hosting.com

Language: English - Date: 2015-02-25 02:50:15
627Graphics file formats / Technical communication tools / Adobe Systems / Cloud storage / Cloud computing security / Portable Document Format / Adobe Acrobat / Data center / Payment Card Industry Data Security Standard / Computing / Software / Cloud computing

Adobe Document Cloud Security Overview Adobe Document Cloud security Adobe Document Cloud combines a completely re-imagined Adobe Acrobat with the power of e-signatures. Now you can edit, sign, send and track documents

Add to Reading List

Source URL: www.echosign.adobe.com

Language: English - Date: 2015-04-06 02:05:24
628Data management / Cloud storage / Data center / Distributed data storage / Networks / Computer security / Concurrent computing / Distributed computing / Computing

Establishing Remote Access to Confidential German Micro Labor Market Data Jörg Heining1,2 and Stefan Bender1 for Employment Research (IAB), Nuremberg, Germany, 2 Corresponding author: Jörg Heining, e-mail: joerg.heinin

Add to Reading List

Source URL: www.statistics.gov.hk

Language: English - Date: 2013-08-22 04:39:17
629Computer security / Cloud computing / Virtual private network / Computer network / Password / Client–server model / Wireless security / Remote desktop software / Computer network security / Computing / Security

Microsoft Word - REMOTE COMPUTING

Add to Reading List

Source URL: mpwa.co.uk

Language: English - Date: 2015-01-28 08:23:55
630Cloud storage / Cloud infrastructure / Data center / Cloud computing security / Cloud computing / Computing / Centralized computing

The Cloud is Only as Secure as its Provider: What to Know Before You Migrate By Lauren Gibbons Paul One of IT’s biggest balancing acts is to make data transactions easily available to authorized users while preventing

Add to Reading List

Source URL: www.qtsdatacenters.com

Language: English - Date: 2014-12-05 16:50:18
UPDATE