Cloud computing security

Results: 3057



#Item
991Cloud infrastructure / Emerging technologies / Apache Hadoop / Big data / Virtualization / Quantum Bigfoot / RCFile / Cloud computing / Computing / Centralized computing

APPLICATIONS Symantec Research Labs contributes to BigFoot by developing solutions for cyber security. The problems of attack attribution and situational awareness require highly scalable tools to classify, correlate and

Add to Reading List

Source URL: bigfootproject.eu

Language: English - Date: 2013-11-25 05:14:35
992Legal aspects of computing / Cyberspace Law and Policy Centre / Cloud computing security / Cloud communications / Cloud computing / Centralized computing / Computing

Premium Items_338788_LLane

Add to Reading List

Source URL: www.cyberlawcentre.org

Language: English - Date: 2014-04-24 05:17:42
993Computing / Service delivery platform / Technology / Network architecture / Sockets Direct Protocol / Bluetooth / Cloud computing / Port / SIMPLE

Software Defined Perimeter Working Group SDP Specification 1.0 April 2014 CLOUD SECURITY ALLIANCE SDP Specification 1.0, April 2014

Add to Reading List

Source URL: downloads.cloudsecurityalliance.org

Language: English - Date: 2014-04-30 16:54:52
994Data management / Cloud storage / Information technology management / Backup / Data security / Information Technology Infrastructure Library / Framework Programmes for Research and Technological Development / Data center / Concurrent computing / Computing / Distributed computing

Position Description Position Details Position title: Storage and Backup Team Member

Add to Reading List

Source URL: www.jobs.act.gov.au

Language: English - Date: 2015-04-07 20:16:16
995System software / Data security / Data synchronization / Remote backup service / Backup / Cloud storage / Incremental backup / File Transfer Protocol / File server / Computing / Backup software / Software

Offsite Backup: Benefits and Threats Unveiled http://www.softwaretalks.com/offsite-backup/ Good backup habits are essential to everyone who uses a computer with important information. It takes just a few accidental click

Add to Reading List

Source URL: www.softwaretalks.com

Language: English - Date: 2006-05-06 04:02:58
996Risk / Management / Risk analysis / Information technology management / IT risk management / Information security / IT risk / Cloud computing / Vulnerability / Security / Data security / Computer security

Gartner Security & Risk Management Summit[removed] – 26 August  |  Sydney, Australia  |  gartner.com/ap/security Smart Risk — Balancing Security

Add to Reading List

Source URL: www.gartner.com

Language: English
997Computer security / Network management / System administration / Healthways / Security information and event management / Accelops / Cloud computing / Data center / Oracle Database / Computing / Information technology management / Software

CASE STUDY Healthways Monitors and Secures Global Health and Wellness with AccelOps B

Add to Reading List

Source URL: pages.accelops.com

Language: English - Date: 2015-04-01 17:10:58
998Network architecture / Network performance / Internet protocols / Virtual private network / WAN optimization / SSL-Explorer: Community Edition / Array Networks / Computing / Computer network security / Internet privacy

SANGFOR SSL VPN With the development of cloud computing and mobile devices, modern workforces have become increasingly mobilized and distributed. This trend requires business organizations to prepare its IT infrastructur

Add to Reading List

Source URL: www.sangfor.net

Language: English - Date: 2015-04-06 12:11:20
999Human rights / Computing / Data management / Data privacy / Cloud computing security / Data security / Internet privacy / Health Insurance Portability and Accountability Act / Information privacy / Ethics / Computer security / Privacy

NIST Big Data Working Group (NBD-WD) NBD-WD-2013/M0013 Source: Security and Privacy Subgroup

Add to Reading List

Source URL: bigdatawg.nist.gov

Language: English - Date: 2013-07-09 20:49:46
1000Computing / Windows Vista / Cloud computing / Cyberwarfare / IICCRD / Check Point / Computer security / Identity / Identity management

Relation of the Big Data Security Operational Taxonomy to the Reference Architecture System Orchestrator: Policy Enforcement Security Metadata Model Data Loss Prevention, Detection

Add to Reading List

Source URL: bigdatawg.nist.gov

Language: English - Date: 2015-01-05 23:40:22
UPDATE