Control system security

Results: 2384



#Item
201Data security / File hosting / Cryptographic software / Data synchronization / Dropbox / Backup / Public-key cryptography / File system / Remote backup service / Computing / Cloud computing / Software

1 Secure Overlay Cloud Storage with Access Control and Assured Deletion Yang Tang, Patrick P. C. Lee, John C. S. Lui, Radia Perlman Abstract—We can now outsource data backups off-site to third-party cloud storage serv

Add to Reading List

Source URL: www.cs.cuhk.hk

Language: English - Date: 2012-06-30 22:42:56
202Identity management / Access control / Credential / Federated identity / Password fatigue / Password strength / Security / Computer security / Password

Important Information about October 2015 Renewal Please take a moment to review the following information about the FCB’s on-line certification system that was implemented last year. There are two issues: 1) in regard

Add to Reading List

Source URL: flcertificationboard.org

Language: English - Date: 2015-04-21 11:35:37
203Computer network security / Computer networking / Cyberwarfare / Data security / Firewall / Packet Processing / Netfilter / Network address translation / Traffic flow / Computing / Network architecture / System software

OpenNF: Enabling Innovation in Network Function Control Aaron Gember-Jacobson, Raajay Viswanathan, Chaithan Prakash, Robert Grandl, Junaid Khalid, Sourav Das, and Aditya Akella University of Wisconsin-Madison {agember,ra

Add to Reading List

Source URL: agember.com

Language: English - Date: 2014-07-07 17:03:14
204Access control / Secure state / Trusted system / Multilevel security / Security / Computer security / Bell–LaPadula model

A Security Model for Military Message Systems: Retrospective Carl E. Landwehr Mitretek Systems, Inc. Constance L. Heitmeyer Naval Research

Add to Reading List

Source URL: www.landwehr.org

Language: English - Date: 2012-01-27 15:46:35
205Content-control software / Fortinet / Hyper-V / Virtual machine / VM / System software / Software / Computer network security

FortiManager TM Centralized Security Management Take Control of Your Security Infrastructure

Add to Reading List

Source URL: www.corex.at

Language: English - Date: 2015-05-13 12:15:10
206Information technology management / Business software / Issue tracking system / Request Tracker / Voucher / Computer security incident management / Help desk / Software / Business

Financial Control Division Support Unit The Financial Control Division Support Unit (FCDSU) Help Ticket is available for downloading at the Department of Finance and Administration (DFA) website under Help Desk. http://w

Add to Reading List

Source URL: nmdfa.state.nm.us

Language: English - Date: 2015-04-14 12:17:30
207Cyberwarfare / Antivirus software / Content-control software / Fortinet / Computer security / Application firewall / Spyware / Network security / Firewall / Computer network security / System software / Computing

DATASHEET FortiGuard® Global Security Research and Protection FortiGuard Labs More than 125 security threat researchers, engineers, and forensic specialists comprise

Add to Reading List

Source URL: www.corex.at

Language: English - Date: 2015-05-13 12:09:00
208Computer security / Data security / Risk / Information technology governance / COBIT / Information Systems Audit and Control Association / Information security management system / Vulnerability / Audit / Information technology audit / Auditing / Information technology management

Conference Progam & Key EventsAugust , 2015 Sheraton on the Park – Elizabeth Street, Sydney Sunday 9th August Conference Registration

Add to Reading List

Source URL: www.oceaniacacs2015.org

Language: English - Date: 2015-06-01 18:03:39
209System software / Computer architecture / Content-control software / Fortinet / Windows Server / Cryptographic protocols / Application firewall / Windows / IPsec / Computer network security / Computing / Tunneling protocols

FortiClientTM Endpoint Security Application FortiClient is an all-in-one comprehensive security solution that extends the power of FortiGate’s unified threat management to endpoints on your network. Desktops, laptops,

Add to Reading List

Source URL: www.corex.at

Language: English - Date: 2015-05-13 12:15:13
210Network architecture / Electronics / Quality of service / Network intelligence / System Architecture Evolution / Network processor / Continuous Computing / Deep packet inspection / Computer network security / Computing

Product Brief Qosmos ixEngine®: Policy Control and Charging (PCC) Use Case For developers of telecom equipment who want to build products to handle the growth of mobile data traffic, provide

Add to Reading List

Source URL: www.qosmos.com

Language: English - Date: 2015-03-31 11:09:08
UPDATE